Thu.Jun 13, 2019

article thumbnail

Empower Employees While Preventing Insider Data Breaches

Data Breach Today

Make Technology Your Last Line of Defense, Says Tony Pepper of Egress Carelessness, a lack of security awareness, unclear data ownership and poor toolsets are root causes of insider breaches, says Tony Pepper, CEO of Egress, which recently surveyed CISOs and employees to trace the cause of insider breaches resulting from both intentional and unintentional loss.

article thumbnail

How to Dominate the Domains of the NEW CIP - D3: Digitalizing Core Business Processes

AIIM

Welcome back to this continuing series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 3, Digitalizing Core Business Processes. You can see the posts for Domain 1, Creating and Capturing Information and Domain 2, Extracting Intelligence from Information. Digitalizing core business processes is much more than scanning paper documents or workflows.

Paper 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

House Approves Lifting HHS Ban on Unique Patient IDs

Data Breach Today

Amendment - Part of a Funding Bill - Still Has a Long Way to Go The House of Representatives has approved an amendment that would lift a 20-year ban on the Department of Health and Human Services funding the development or adoption of a unique, national patient identifier. But plenty of hurdles remain. Find out why this is a critical issue for CISOs as well as privacy officers.

Privacy 164
article thumbnail

7 Truths About BEC Scams

Dark Reading

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.

110
110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Top Drivers for Privileged Account Management

Data Breach Today

Grant Burst of Wallix Says Operational Technology Driving More PAM Rollouts When it comes to drivers for implementing and maintaining privileged access management programs, Wallix's Grant Burst says that demonstrating compliance and safety remain top priorities. Another driver, he says, is the sheer interconnectedness of devices - driven by the rise of IoT.

IoT 138

More Trending

article thumbnail

Proactive Mitigation: A Cybersecurity Imperative

Data Breach Today

Akamai's Jay Coley on Blunting Hackers by Blocking Emerging Types of Attacks A top cybersecurity imperative for organizations is to "take proactive mitigation before an event even occurs" by tracking attack trends and mitigating against emerging types of attacks, says Akamai's Jay Coley.

article thumbnail

What is data protection by design and default

IT Governance

If your organisation is subject to the GDPR (General Data Protection Regulation) , you’re probably aware of your requirement to “implement appropriate technical and organisational measures” to protect the personal data you hold. An essential principle of this is data protection by design and by default. This essentially means that you must consider privacy and information security risks at the outset of all projects that involve personal data.

GDPR 90
article thumbnail

Gain Certification Skills and Earn Digital badges at Enterprise World 19

OpenText Information Management

Now more than ever, technical certifications help launch and accelerate careers. In technology roles, advancing your career is about demonstrating the skills you bring to an organization and the value you can add, not simply how long you’ve been in the industry. Technical certifications are an industry recognized method of showing a level of knowledge … The post Gain Certification Skills and Earn Digital badges at Enterprise World 19 appeared first on OpenText Blogs.

article thumbnail

SQL Injection Attacks Represent Two-Third of All Web App Attacks

Dark Reading

When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.

96
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New French Data Protection Act and Implementing Decree Take Force

Hunton Privacy

On June 1, 2019, New Decree No. 2019-536 (the “Implementing Decree”) took force, enabling the French Data Protection Act, as amended by an Ordinance of December 12, 2018, likewise to enter into force. This marks the completion of the adaption of French law to the EU General Data Protection Regulation (“GDPR”) and the EU Police and Criminal Justice Directive (Directive (EU) 2016/680).

article thumbnail

Cyberattack Hits Aircraft Parts Manufacturer

Dark Reading

Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.

article thumbnail

Millions of Exim mail servers are currently under attack

Security Affairs

Hackers are targeting millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions, threat actors leverage the CVE-2019-10149 flaw. Millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions are under attack, threat actors are exploiting the CVE-2019-10149 flaw to take over them. A critical vulnerability affects versions 4.87 to 4.91 of the Exim mail transfer agent (MTA) software.

article thumbnail

BlueKeep RDP Vulnerability a Ticking Time Bomb

Dark Reading

One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.

80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ransomware paralyzed production for at least a week at ASCO factories

Security Affairs

Malware infections could be devastating for production environments, a ransomware infection halts production operations for days at airplane parts manufacturer ASCO. ASCO , is of the world’s largest manufacturers of aerospace components. The company has offices and production plants in Belgium, Canada, Germany the US, Brasil, and France. ASCO provides components to Airbus, Boeing, Bombardier Aerospace, and Lockheed Martin.

article thumbnail

DNS Firewalls Could Prevent Billions in Losses to Cybercrime

Dark Reading

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.

91
article thumbnail

What we learned at WWDC 2019

Jamf

From new Apple operating systems to enhanced security and enrollment workflows, see the exciting news that came out Apple's Worldwide Developer Conference.

article thumbnail

DNS Firewalls Could Save Companies Billions

Dark Reading

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.

90
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Evernote Critical Flaw Opened Personal Data of Millions to Attack

Threatpost

Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users.

article thumbnail

The Rise of 'Purple Teaming'

Dark Reading

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

83
article thumbnail

Five steps to a successful migration to cloud-based SaaS applications

DXC Technology

A digital transformation can deliver improved flexibility, faster speed-to-market and reduced costs, but only if you go about things in the right way. One path to a successful digital transformation is to move traditional applications to cloud-based software-as-a-service (SaaS) applications, a migration that requires a data-driven approach and using technology in strategic, new ways.

article thumbnail

Congress Gives 'Hack Back' Legislation Another Try

Dark Reading

Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.

81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Hack Yourself First - The UK Tour by Scott Helme

Troy Hunt

It's the Hack Yourself First UK Tour! I've been tweeting a bit about this over recent times and had meant to write about it earlier, but I've been a little busy of late. Last year, I asked good friend and fellow security person Scott Helme to help me out running my Hack Yourself First workshops. I was overwhelmed with demand and he was getting sensational reviews for the TLS workshops he was already running.

Access 62
article thumbnail

Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech

Dark Reading

ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos.

Access 78
article thumbnail

Flaw in Evernote Web Clipper for Chrome extension allows stealing data

Security Affairs

Security experts discovered a vulnerability in the popular Evernote Web Clipper for Chrome can be exploited to steal sensitive data from sites visited by users. Security experts at browser security firm Guardio discovered a critical universal cross-site scripting (XSS) vulnerability in the Evernote Web Clipper for Chrome. “In May 2019 Guardio’s research team has discovered a critical vulnerability in Evernote Web Clipper for Chrome.” reads a blog post published by Guardio. R

article thumbnail

The Rise of "Purple Teaming"

Dark Reading

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

WAGO Industrial Switches affected by multiple flaws

Security Affairs

A security expert at SEC Consult discovered that some WAGO industrial managed switches are affected by several serious vulnerabilities. A security researcher at consulting company SEC Consult discovered several vulnerabilities in some models of WAGO industrial switches. The vulnerabilities affect WAGO industrial switches 852-303, 852-1305 and 852-1505 models.

article thumbnail

The CISO's Drive to Consolidation

Dark Reading

Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.

article thumbnail

Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk

Threatpost

The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.

Risk 64