Sabre Settles for $2.4 Million Over 2017 Breach

Data Breach Today

that will resolve a 2017 data breach that struck the company's Sabre Hospitality Solutions hotel booking system, which compromised 1.3 Settlement Also Requires Company to Enhance Cybersecurity Measures The attorneys general of 27 states have entered into a $2.4

Cartographic’s Favorites of 2017

Sales Hacker

The map of Le Bonhomme in France appears to be pretty average but it is the unique connection to a photograph within the holdings of the Still Pictures Branch which makes this map a favorite of 2017. Co-written with Amy Edwards. The Cartographic Branch holds a wide variety of materials. While working with these documents for reference requests, projects, or research room requests, our staff comes across some very cool and significant documents.

Sales 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Influencers assess 2017 and make predictions for 2018

IBM Big Data Hub

As the year winds down, questions tend to arise about what the big trends of the past year have been and what the year to come may hold

Top 10 IBM Big Data & Analytics Hub podcasts of 2017

IBM Big Data Hub

It can be difficult to keep up with all the best podcast episodes during the year. That's why we've compiled the Top 10 podcasts of the year from the IBM Big Data & Analytics Hub Insights Podcast feed right here

Top 10 IBM Big Data & Analytics Hub blog posts of 2017

IBM Big Data Hub

Here are our top 10 blog posts of 2017 Readers of the IBM Big Data & Analytics Hub were hungry for knowledge this year. They voraciously read blog posts about incorporating machine learning, choosing the best possible data model, determining how to make the most of data science skills, working with open source frameworks and more.

'Starwars' Debuts on List of Worst Passwords of 2017

Dark Reading

Many of the old standbys made this year's list of the 25 stolen - and weakest - passwords found dumped online

2017 Has Broken the Record for Security Vulnerabilities

Dark Reading

Some 40% of disclosed vulns as of Q3 are rated as severe, new Risk Based Security data shows

Risk 78

Recapping the IBM Chief Data Officer Strategy Summit Fall 2017

IBM Big Data Hub

See what you missed at the IBM Chief Data Officer Strategy Summit Fall 2017 in Boston, Massachusetts with a collection that includes a full social recap, videos, quotes and more

Post-Breach Carnage: Worst Ways The Axe Fell in 2017

Dark Reading

Executive firings, stock drops, and class action settlements galore, this year was a study in real-world repercussions for cybersecurity lapses

5 reasons Analytics University is the analytics event of 2017

IBM Big Data Hub

IBM Analytics is coming to Berlin and New Orleans this October. Here are five traits that make the conference unique. Can't make it? Join the Facebook livestream on October 10 or watch the replay to hear the opening session keynotes from Joel Shapiro and Marc Altshuller

Trolls, Bots, and Fake News Made 2017 a Terrible Year for Internet Freedom

WIRED Threat Level

Trolls, bots, and fake news posed a serious threat to internet freedom this year—and there's no easy answer in sight. Security

The Most-read WIRED Security Stories of 2017

WIRED Threat Level

Numerous tales of hacking and breaches proves just how permeable the digital membrane can be. Security

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. The U.S.

2017 Tesla Hack

Schneier on Security

Interesting story of a class break against the entire Tesla fleet. cars classbreaks hacking vulnerabilities

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

In this installment, we share the top three blog posts of 2017: how to save money with RIM, corporate moves, and document imaging for financial institutions. [.] The post Best of TAB 2017 part 2: the top blog posts appeared first on TAB Records Management Blog | TAB OnRecord. It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides.

Paper 78

Reader favorites September 2017: Our most popular RIM resources

TAB OnRecord

The post Reader favorites September 2017: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord. The most popular RIM resources this month will help your efforts to go digital. Our buyer's guide helps you choose the best RIM software to capture and store your digital images. To help you plan the project, we have two helpful resources. The first is a comprehensive document imaging planning guide; the second is a… Read More.

Data Breach Today - Untitled Article

Data Breach Today

By the end of 2017, marketers are utilizing features like Live Chats, Social Media, Emails, LinkedIn personal messages and other ways to create better communication channels for the users. Learn about few of best growth hacks of passing year 2017 by @becca_matias [link] #GrowthHacks #B2BLeadGen #LeadGeneration #CompetitionInTheMarket #MapYourGrowth. Only B2B (@Onlyb2b) December 29, 2017. 18 Best 2018 B2B Lead Generation Strategies For Marketers.

B2B 175

Equifax Settles With Massachusetts, Indiana Over 2017 Breach

Data Breach Today

Company Will Pay $38 Million to Settle 2 Lawsuits Massachusetts and Indiana have reached separate settlements with Equifax over the 2017 data breach that exposed the personal information of millions of residents of both states.

Reader favorites November 2017: Our most popular RIM resources

TAB OnRecord

The post Reader favorites November 2017: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord. This month's roundup of popular resources covers document imaging, RIM outsourcing, and shared drive management. Guide: A best practice template for your imaging project This planning template provides a framework to help you create your own document imaging plan.

Reader favorites December 2017: Our most popular RIM resources

TAB OnRecord

The post Reader favorites December 2017: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord. The most popular RIM resources this month cover document imaging, metadata and RIM ROI. Why, what and how: three questions to answer before embarking on a document imaging project This guide was prepared to help representatives from lines of business, operations, IT and records management in the early planning stages of a document imaging project. [.]

Briefing paper to Peers in advance of the Committee Stage of the Data Protection Bill in the House of Lords [30 October 2017]

Data Protector

Your Lordships This bill has been eagerly awaited by data protection professionals, whose careers depend on its successful passage. Please don’t worry too much that the bill is so very hard to understand. It's the Government’s way of ensuring that a select band of privacy professionals will be offered very significant salaries to decipher its contents and recommend ways of complying with the key provisions.

Paper 120

Reader favorites October 2017: Our most popular RIM resources

TAB OnRecord

The post Reader favorites October 2017: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord. The most popular RIM resources this month cover several hot records management topics. Our free guide provides tips to save money with your records management program. Our popular white paper on records retention is a handy reference for every RIM professional designing a records management program.

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Data Breach Today

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report

The Weekly Independent: August 28, 2017

eSecurity Planet

This is the August 28, 2017 edition News and notes for independent professionals and their clients.

40

Our Best Sales Tips of 2017

Outreach

It's hard to choose just one favorite, so here are our top 10 sales tips of 2017 There's no time like the end of the year to reflect on the past 12 months. This year, we've learned and shared a ton of sales best practices to help you and your team hit #PeakExcellence.

Sales 58

e-Records 2017: Video and Wrap Up

The Texas Record

Presentation materials from the conference are available on the e-Records 2017 website. Video: News eRecords eRecords 2017 Local Governments State Agencies TSLACTo close out this year’s e-Records Conference coverage, here is a listing of all the session recaps and a video produced by TSLAC’s Communications team. We hope you enjoyed the conference and look forward to next year! Information Governance: Take Control and Succeed.

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

WIRED Threat Level

The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol. Security

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money

RSA USA 2017 In Review

The Falcon's View

If you've never been to RSA, or if you only started attending in the last couple years, then it's really hard to describe to you how dramatic the change has been since ~2010 when the numbers started growing like this (to be fair, yoy growth from 2016 to 2017 wasn't all that huge). my thoughts from RSA 2017. conferences infosec 2017 experience review rsa

e-Records 2017 – “The Public Information Act and Updates from the 85th Legislative Session”

The Texas Record

This is the second post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. After the Opening Remarks, Justin Gordon from the Office of the Attorney General addressed the 2017 attendees. News Training eRecords 2017 Local Governments Public Information Request State AgenciesInformation Governance: Take Control and Succeed.

Cryptocurrency Infrastructure Flaws Pose Bitcoin Risks

Data Breach Today

Major Cybercrime Gangs Shift From Hacking Banks to Bitcoins Bitcoin's massive rise in value and hype continues to draw the attention of hackers, scammers and organized crime. Flaws in bitcoin mining firmware and hacks of wallet software show that the infrastructure associated with cryptocurrency is not always well-secured

Risk 157

Millions of Computers Affected By Intel Firmware Flaws

Data Breach Today

Numerous Manufacturers Must Prep and Distribute Customized Patches Security experts are readying for more details from chipmaker Intel about two classes of vulnerabilities in its chips that could put organizations' most trusted data at risk. Millions of computers are affected, and computer manufacturers must prep and distribute customized patches

ENISA: Software vulnerability prevention initiatives

Data Breach Today

The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities

e-Records 2017: “Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365”

The Texas Record

This is the fourth post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. News ARMA Principles Conferences electronic records eRecords eRecords 2017 Information Governance Local Governments Training TSLACInformation Governance: Take Control and Succeed. The Public Information Act and Updates from the 85th Legislative Session. TSLAC Wants Your Electronic Records.

Accounting of Disclosures Under the HITECH Act

Data Breach Today

A notice of proposed rulemaking from the HHS Office for Civil Rights that would modify the HIPAA Privacy Rule standard for accounting of disclosures of protected health information and add new requirements for access reports

FFIEC Final Authentication Guidance

Data Breach Today

The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment

Report: Russian Hackers Target Banks in US, Britain, Russia

Data Breach Today

Nearly $10 Million Stolen from 20 Institutions in Past 1½ Years A group of Russian-speaking hackers over the past year-and-a-half has stolen nearly $10 million from banks, mostly in the United States, Britain and Russia, the Moscow-based, according to cybersecurity firm Group-IB

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Cloud Protection & Licensing

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. To learn more about the state of data encryption in Australia, download the 2017 Thales Australia Encryption Trends Study here. The post Key Findings from the 2017 Thales Encryption Trends Study: Australia appeared first on Data Security Blog | Thales e-Security.

Cloud 62

2017 Top Data Breaches: The Year In Review

Rippleshot

The year 2017 won’t be the last year that’s remembered for producing a record number of data breaches. To wrap up the year, we’ve gathered a list of major data breaches that made headlines in 2017, starting with the incident that will continue to make news long into 2018. There’s a good chance the same story will be repeated for years to come. But what everyone can learn from the growing number of incidents is why greater breach prevention and detection is needed more now than ever.

Google Patches Android for 47 Vulnerabilities in Final Update for 2017

eSecurity Planet

Google end 2017 the same way it began the year, by patching media framework flaws

IT 42