article thumbnail

Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

The most concerning of these appears to be CVE-2020-1380 , which is a weaknesses in Internet Explorer that could result in system compromise just by browsing with IE to a hacked or malicious website. More information on CVE-2020-1337, including a video demonstration of a proof-of-concept exploit, is available here.

article thumbnail

Patch Tuesday, November 2020 Edition

Krebs on Security

” A chief concern among all these updates this month is CVE-2020-17087 , which is an “important” bug in the Windows kernel that is already seeing active exploitation. “With no details provided by Microsoft, we can only assume this is the bypass of CVE-2020-16875 he had previously mentioned,” Childs said.

Security 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: 2020 Health Data Breach Trends

Data Breach Today

Ransomware, Phishing Incidents, Vendor Hacks Prevail Hacking incidents, including ransomware and phishing attacks, as well as security incidents involving vendors dominated the federal tally of major health data breaches in 2020.

article thumbnail

4 State AGs Punch EyeMed With $2.5 M Fine for 2020 Breach

Data Breach Today

million fine as part of a settlement in the aftermath of a 2020 email phishing incident that affected 2.1 NJ, Pennsylvania, Oregon, Florida Settlements Follow Earlier Fines by NY Regulators The attorneys general of four states have smacked vision care provider EyeMed Vision Care with a $2.5 million individuals in the United States.

Phishing 251
article thumbnail

7 Questions Every App Team Should Ask

In its 2020 Embedded BI Market Study, Dresner Advisory Services continues to identify the importance of embedded analytics in technologies and initiatives strategic to business intelligence. Which sophisticated analytics capabilities can give your application a competitive edge?

article thumbnail

2020 Breach Statistics: An Analysis

Data Breach Today

data breaches in 2020 isn't all good news; it reflects that hackers are changing their tactics, says James Lee of the Identity Theft Resource Center, who offers an analysis of the center's new data breach report. James Lee of the Identity Theft Resource Center Discusses Reasons Behind Breach Decline The decline in the total number of U.S.

article thumbnail

Over 400 Cyberattacks at US Public Schools in 2020

Data Breach Today

public schools faced a record number of cyber incidents in 2020, with over 400 attacks reported. Experts Say Increase Owes to Lack of Funding, Virtual Learning U.S.

article thumbnail

5 Essential Pieces of a Prospecting Solution

Is your team focused on building a reliable tech stack for 2020? Forward thinking sales leaders are starting to prioritize technology initiatives. As organizations chase new revenue targets, B2B sales leaders must examine cutting edge prospecting solutions that proactively help reps identify, connect with, and close qualified buyers faster.

article thumbnail

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.".

article thumbnail

2020 Database Strategies and Contact Acquisition Survey Report

This report aims to highlight the current state of B2B database and contact acquisition strategies and organizations’ goals to leverage data to fuel their go-to-market strategies in 2020 and beyond.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this webinar, you'll be provided with a clear overview of the Anti-Money Laundering Act of 2020 (AMLA), which also includes the Corporate Transparency Act (CTA). The AMLA represents the most significant changes in U.S. anti-money laundering laws since the USA PATRIOT Act of 2001.

article thumbnail

Report by Dresner Advisory Services: Embedded Business Intelligence Market Study

According to the 2020 Dresner Embedded Business Intelligence Market Study, embedded business intelligence is crucial for application success. This report explores the current state of BI and why application teams are increasingly choosing an embedded solution.

article thumbnail

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises are pouring money into data management software – to the tune of $73 billion in 2020 – but are seeing very little return on their data investments.

article thumbnail

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

February 27, 2020 9:30AM PST, 12:30PM EST, 5:30PM GMT. How a platform-based approach can solve modern content challenges. Strategies to avoid the risks of modernization by future-proofing your organizational infrastructure.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Tuesday December 8, 2020 at 11AM PDT, 2PM EST, 7PM GMT. How a belief that DevOps resources are jack of all trades can increase your risks, not lessen. Slowing down development is not a skills gap it is just a gap in perspective and integration. How we see shift left is undermining it further.