Remove about
article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. If your mind is not blown already, here’s a crowd of about six hundred people cheering for a video game to start. Capture the Flag events, a collective obsession. The kind of stuff hackers fantasize about.

article thumbnail

VMware Flaw a Vector in SolarWinds Breach?

Krebs on Security

3, and said it learned about the flaw from the NSA. In response to questions from KrebsOnSecurity, VMware said it has “received no notification or indication that the CVE 2002-4006 was used in conjunction with the SolarWinds supply chain compromise.” ” The NSA has not yet responded to requests for comment. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why you should keep data observability separate from data cleansing

Collibra

I often hear questions about commingling the Observability and Resolution features to solve for data quality – typically surmised as “Why can’t our tool both detect and resolve data quality issues?” Basel II lists seven risk categories with clear reference to data governance given “data entry” and “data maintenance” (Event Type 7).

Risk 91
article thumbnail

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements. The Final Rule also builds on the Safeguards Rule’s employee training requirements.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

A cyber insurance backstop would provide a means for insurers to receive financial support from the federal government in the event that there was a catastrophic cyberattack that caused so much financial damage that the insurers could not afford to cover all of it. 11, 2001, terrorist attacks.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Similarly, the DT journey is about reimagining the future – and imagining new ways of doing things. The pandemic forced every organization to think about the “art of the possible.” One argument is that DG focuses on structured data in databases, while IG is about unstructured content. Intelligent Capture.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

Ten years later, KrebsOnSecurity has uncovered new clues about the real-life identity of Rescator. That story about the Flashback author was possible because a source had obtained a Web browser authentication cookie for a founding member of a Russian cybercrime forum called BlackSEO. Chang’s.