Tue.May 04, 2021

article thumbnail

NIST Seeks Input on HIPAA Security Rule Guidance Update

Data Breach Today

But Is It Time to Overhaul the Rule Itself? The National Institute of Standards and Technology is seeking public comment as it plans to update its 2008 guidance for implementing the HIPAA Security Rule. But is it time to update the security rule itself?

Security 315
article thumbnail

[Podcast] How Will Humanity Survive the AI Revolution?

AIIM

How will humanity survive the AI revolution? Simple—we become superhuman. That is the subject of our new AIIM On Air interview with author and researcher Alex Bates. In his book " Augmented Mind, " Alex explains how the combination of AI with human intelligence – what he calls Intelligence Augmentation -- has revolutionary potential. After a decade on the front lines of AI research and implementation facilitating the collaboration of humans and AI, Bates created a global mastermind network of ap

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Authentication: Lessons Learned During Pandemic

Data Breach Today

Strategist Coby Montoya Discusses Leveraging Behavioral Biometrics to Fight Fraud With consumers relying more heavily on e-commerce during the pandemic and beyond, leveraging behavioral biometrics for authentication is an effective strategy, says Coby Montoya, a fraud-fighting and authentication strategist at a financial company.

article thumbnail

German Federal Labor Court rules on the scope of the right to information under Art. 15 GDPR

DLA Piper Privacy Matters

Authors: Katharina Pauls and Katia Helbig. In a legal dispute to be decided by the German Federal Labor Court, the court had the opportunity to rule on the highly controversial scope of the right to information under Art. 15 GDPR. Specifically, the issue was whether or to what extent Art. 15 GDPR grants a right to receive copies of e-mails. This question is controversially discussed, particularly in the employment context.

GDPR 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Iran's Military Reportedly Backs Ransomware Campaign

Data Breach Today

Could Cyberespionage Be Campaign's Real Purpose? Iran's Islamic Revolutionary Guard Corps was behind a ransomware campaign that used a contracting company called "Emen Net Pasargard" to target more than a dozen organizations, according to the security firm Flashpoint. But could cyberespionage be the campaign's true mission?

Military 225

More Trending

article thumbnail

A massive DDoS knocked offline Belgian government websites

Security Affairs

A massive distributed denial of service (DDoS) attack shut down Belgiums’ government websites, internal networks were also impacted. A massive distributed denial of service (DDoS) attack hit most of the Belgium government ’s IT network, according to the media the attack also knocked offline internal systems. People attempting to visit websites hosted on the Belnet network were not able to reach them and were displayed error messages.

article thumbnail

Then a Hacker Began Posting Patients’ Deepest Secrets Online

WIRED Threat Level

A family-run psychotherapy startup grew into a health care giant. It was a huge success—until the data breach and the anonymous ransom notes sent to clients.

article thumbnail

Global Phishing Attacks Spawn Three New Malware Strains

Threatpost

The never-seen malware strains have "professionally coded sophistication" and were launched by a well-resourced APT using nearly 50 domains, one hijacked.

Phishing 109
article thumbnail

Most of Exim email servers could be hacked by exploiting 21Nails flaws

Security Affairs

The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim email server software have released security updates to address a collection of 21 vulnerabilities, dubbed 21Nails , that can be exploited by attackers to take over servers and access email traffic through them.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. madhav. Tue, 05/04/2021 - 09:40. Threat or Opportunity? With every change, comes disruption to the current set of ecosystems and practices, providing an opportunity to do things differently and in a better way. The key lies in being able to sense the change on the horizon and getting ready to embrace that change.

article thumbnail

It's Time to Ditch Celebrity Cybersecurity

Dark Reading

High-profile attacks and solutions are shiny objects that can distract from the defenses that afford the greatest protection.

article thumbnail

Hundreds of millions Of Dell PCs affected by CVE-2021-21551 flaws

Security Affairs

American multinational computer technology giant Dell addresses a 12-year-old driver flaw, tracked as CVE-2021-21551 , impacting millions of computers. Hundreds of millions of Dell computers worldwide are affected by a 12-year-old vulnerability, tracked as CVE-2021-21551, that affects Dell DBUtil driver. The flaw affects version 2.3 of the Dell BIOS driver, it is one of a series of escalate privileges issues discovered by researchers from SentinelLabs.

Access 101
article thumbnail

Hundreds of Millions of Dell Users at Risk from Kernel-Privilege Bugs

Threatpost

The privilege-escalation bug remained hidden for 12 years and has been present in all Dell PCs, tablets and notebooks shipped since 2009.

Risk 116
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. The post Seeds of Destruction: Cyber Risk Is Growing in. Read the whole entry. » Related Stories Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk Encore Edition:

article thumbnail

Planning Our Passwordless Future

Dark Reading

All the talk that passwords could one day go away seemed too good to be true, yet the scales are finally started to tip to a passwordless reality. (Part one of a two-part series.

Passwords 133
article thumbnail

ISO Standard for Information Governance enters enquiry stage

IG Guru

The ISO Standard for Information Governance (ISO/DIS 24143) has entered the Enquiry stage, which is one stage before approval and two stages prior to publication. The post ISO Standard for Information Governance enters enquiry stage appeared first on IG GURU.

article thumbnail

Project Signal: a second Iranian State-Sponsored Ransomware Operation

Security Affairs

Iran-linked ATP group carried out a ransomware operation through a contracting company based in the country, Flashpoint researchers warn. Researchers from Flashpoint have uncovered a state-sponsored ransomware campaign conducted by Iran’s Islamic Revolutionary Guard Corps (IRGC) through an Iranian contracting company called “Emen Net Pasargard” (ENP) (aka “Imannet Pasargad,” “Iliant Gostar Iranian,” “Eeleyanet Gostar Iraniyan”).

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

China Issues Second Version of the Draft Personal Information Protection Law for Public Comments

Hunton Privacy

On April 29, 2021, China issued a second version of the draft Personal Information Protection Law (“Draft PIPL”). The Draft PIPL will be open for public comments until May 28, 2021. While the framework of this version of the Draft PIPL is the same as the prior version issued on October 21, 2020, below we summarize the material changes in the second version of the Draft PIPL.

article thumbnail

The i-SIGMA industry mourns the passing of Martha Mayer

IG Guru

I first heard of Martha not doing well from another industry friend a few weeks ago. I was supposed to have a video call with her last week, but she wasn’t up for it. Unfortunately, I heard over the weekend she passed away. Martha died at 8:15 PM CDT on 5/1/2021. Martha was a warm […]. The post The i-SIGMA industry mourns the passing of Martha Mayer appeared first on IG GURU.

IT 93
article thumbnail

Sneakers, Gaming, Nvidia Cards: Retailers Can Stop Shopping Bots

Threatpost

Jason Kent, hacker in residence at Cequence Security, says most retailers are applying 1970s solutions to the modern (and out-of-control) shopping-bot problem, and offers alternative ideas.

Retail 88
article thumbnail

Hundreds of Millions of Dell Computers Potentially Vulnerable to Attack

Dark Reading

Hardware maker has issued an update to fix multiple critical privilege escalation vulnerabilities that have gone undetected since 2009.

100
100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apple Fixes Zero?Day Security Bugs Under Active Attack

Threatpost

On Monday, Apple released a quartet of unscheduled updates for iOS, macOS, and watchOS, slapping security patches on flaws in its WebKit browser engine.

article thumbnail

Using Data De-Identification to Protect Companies

Data Matters

Many companies hope to benefit from amassing large amounts of data by mining it for market insights, creating internal business models, and supporting strategic, data-driven decisions. But as companies collect and store increasingly enormous volumes of data, they may unknowingly take on significant legal risks, including potential violations of data privacy laws and increased exposure to U.S. litigation discovery obligations.

Mining 74
article thumbnail

Scripps Health Responds to Cyberattack

Dark Reading

The health care system says it has suspended access to patient portals and other applications related to operations at Scripps facilities.

Access 87
article thumbnail

China: Navigating China episode 17: China’s Draft Privacy and Security Laws – second drafts clarify compliance steps for businesses

DLA Piper Privacy Matters

Authors: Carolyn Bigg , Venus Cheung and Fangfang Song. Second drafts of the new overarching national personal data protection and data security laws have just been published, and give a clearer picture of the impending new national frameworks in China. 1. Draft Personal Information Protection Law. The Draft Personal Information Protection Law ( “Draft PIPL” ) will – once passed – become the first comprehensive personal data protection law in China.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Can Organizations Secure Remote Workers for the Long Haul?

Dark Reading

By focusing on protection instead of detection, organizations can defend against targeted attacks without compromising security or productivity.

article thumbnail

Why upgrade from Webtop to Documentum D2?

OpenText Information Management

There is such a thing as “too much of a good thing.” It’s a predicament many OpenText™ Documentum™ customers find themselves in with their existing implementations of the Webtop interface. Some have been using this workhorse product for 10-15 years, customizing and adding functionality along the way to meet changing user and business needs. OpenText … The post Why upgrade from Webtop to Documentum D2?

article thumbnail

Raytheon: Supply Chain, Ransomware, Zero Trust Biggest Security Priorities

Dark Reading

SPONSORED CONTENT. While organizations may be more vulnerable than ever to supply chain hacks and ransomware, they can look to Zero Trust frameworks to keep their users and data safe, said Jon Check, a senior director in Raytheon's cyber protection solutions business unit. Check also foresees wider use of automation to handle tasks humans in the SOC can't get to.