article thumbnail

Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

The most concerning of these appears to be CVE-2020-1380 , which is a weaknesses in Internet Explorer that could result in system compromise just by browsing with IE to a hacked or malicious website. More information on CVE-2020-1337, including a video demonstration of a proof-of-concept exploit, is available here.

article thumbnail

2020 Security Agenda: Who Owns it?

Data Breach Today

ForeScout's Ellen Sundra on Security Priorities and Challenges It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of ForeScout.

IT 175
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday, November 2020 Edition

Krebs on Security

” A chief concern among all these updates this month is CVE-2020-17087 , which is an “important” bug in the Windows kernel that is already seeing active exploitation. Microsoft’s release includes fixes for 112 separate flaws, including one zero-day vulnerability that is already being exploited to attack Windows users.

Security 264
article thumbnail

Over 400 Cyberattacks at US Public Schools in 2020

Data Breach Today

public schools faced a record number of cyber incidents in 2020, with over 400 attacks reported. Experts Say Increase Owes to Lack of Funding, Virtual Learning U.S.

article thumbnail

7 Questions Every App Team Should Ask

In its 2020 Embedded BI Market Study, Dresner Advisory Services continues to identify the importance of embedded analytics in technologies and initiatives strategic to business intelligence. Which sophisticated analytics capabilities can give your application a competitive edge?

article thumbnail

2020 Breach Statistics: An Analysis

Data Breach Today

data breaches in 2020 isn't all good news; it reflects that hackers are changing their tactics, says James Lee of the Identity Theft Resource Center, who offers an analysis of the center's new data breach report. James Lee of the Identity Theft Resource Center Discusses Reasons Behind Breach Decline The decline in the total number of U.S.

article thumbnail

Microsoft Patch Tuesday, May 2020 Edition

Krebs on Security

” For example, Satnam Narang from Tenable notes that two remote code execution flaws in Microsoft Color Management ( CVE-2020-1117 ) and Windows Media Foundation ( CVE-2020-1126 ) could be exploited by tricking a user into opening a malicious email attachment or visiting a website that contains code designed to exploit the vulnerabilities. .

Risk 262
article thumbnail

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.".

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Tuesday December 8, 2020 at 11AM PDT, 2PM EST, 7PM GMT. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. How we see shift left is undermining it further.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this webinar, you'll be provided with a clear overview of the Anti-Money Laundering Act of 2020 (AMLA), which also includes the Corporate Transparency Act (CTA). The AMLA represents the most significant changes in U.S. anti-money laundering laws since the USA PATRIOT Act of 2001.

article thumbnail

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises are pouring money into data management software – to the tune of $73 billion in 2020 – but are seeing very little return on their data investments.

article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

IBM reported that the total damage from data breaches in 2021 was 4.24M USD (up from 3.86M USD in 2020), easily the highest aggregated amount on record. If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.”

article thumbnail

Best Practices for Modern Records Management and Retention

Speaker: Sean Baird, Director of Product Marketing at Nuxeo

October 20, 2020 at 11:00 am PDT, 2:00 pm EDT, 7:00 pm BST. Join Sean Baird as he highlights best practices for effective records management and retention. He will explore how digital transformation can counteract the costs, inefficiencies, and end-user considerations that make it difficult to maintain compliance.

article thumbnail

The Evolution of the Data Team: Lessons Learned From Growing a Team From 3 to 20

Speaker: Mindy Chen, Director of Decision Science, Hudl

August 5, 2020 8 AM PDT, 11 AM EDT, 4 PM BST There is no denying that growing a data team has its challenges. What you plan your data team structure to look like initially may not turn out to be the most effective long term. Reflect on the lessons learned at Hudl and what they would have done differently during their evolution.