Remove topic
article thumbnail

Topic Be Damned! AI is the Question

Weissman's World

… Read More » Topic Be Damned! AI is the Question The post Topic Be Damned! It seems that no matter what I get asked to talk about – privacy, information-related risks, the convergence of data and infogov – the first Q&A question I get these days almost always is about AI. What is it? Is it going to take my job?

Privacy 156
article thumbnail

American fast-fashion firm Hot Topic hit by credential stuffing attacks

Security Affairs

Hot Topic suffered credential stuffing attacks that exposed customers’ personal information and partial payment data. Hot Topic, Inc. The attackers detected suspicious login activity to certain Hot Topic Rewards accounts. Hot Topic was not the source of the account credentials used in these attacks.”

Passwords 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Hot Cybersecurity Topics at RSA Conference 2020

Data Breach Today

From the Human Element and Frameworks to Secure Engineering, Privacy and More Which cybersecurity topics are hot? One topical answer to that question comes via the upcoming RSA Conference 2020.

article thumbnail

Trend Watch 2024: Hot Topics in California Regulation and Litigation

Data Matters

65 by the numbers Need-to-know environmental law changes The post Trend Watch 2024: Hot Topics in California Regulation and Litigation appeared first on Data Matters Privacy Blog. Join our 7th annual Trend Watch webinar to learn how tactical decision-making can help you conquer California’s challenging legal environment.

Privacy 88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

The topics covered include: Using Cassandra as if it were a Relational Database. Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. Managing Delete Heavy Workloads.

article thumbnail

Hot Topics in Cybersecurity Research

Data Breach Today

Wade Baker Talks Vulnerability Triage and Quantifying Risk Quantifying risk is a significant challenge in cybersecurity. Wade Baker of Cyentia Institute discusses recent research projects.

article thumbnail

Hot Topic Apparel Brand Faces Credential-Stuffing Attack

Dark Reading

Due to the nature of the attack, Hot Topic says that it was unable to tell which accounts were accessed by legitimate users and which were accessed by threat actors, making the situation all the more difficult.

Access 62
article thumbnail

The Definitive Guide to Embedded Analytics

The Definitive Guide to Embedded Analytics is designed to answer any and all questions you have about the topic. But many companies fail to achieve this goal because they struggle to provide the reporting and analytics users have come to expect. It will show you what embedded analytics are and how they can help your company.

article thumbnail

The Definitive Guide to Embedded Analytics

The Definitive Guide to Embedded Analytics is designed to answer any and all questions you have about the topic. But many companies fail to achieve this goal because they struggle to provide the reporting and analytics users have come to expect. It will show you what embedded analytics are and how they can help your company.

article thumbnail

ABCs of Data Normalization for B2B Marketers

It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. Data normalization. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

He will also dive into topic definitions, governance structures, and framework components for success. This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the answers to these questions and other foundational elements you need to start or validate your ERM program. Register today!

article thumbnail

ABM Success Recipe: Mastering the Crawl, Walk, Run Approach

Key topics will include: Getting started: the "crawl" phase of ABM and its boundaries Unlocking the potential of the "run" phase and using the right strategy for scaling your efforts The essential components of an effective ABM tech stack within each stage Real-world insights from NetSPI's ABM journey with MarketingOS

article thumbnail

The Modern Encryption Software Checklist: The Secret to Understanding Your Data Security Needs

The following checklist is built to help you evaluate the scope of services offered by various encryption solutions on the market and covers questions on the following topics: Encryption. Fortunately, there is a solution. Key management system. User authentication and advanced security factors. Enterprise features.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises.