Mon.Oct 10, 2022

article thumbnail

The Challenges of Kubernetes and Cloud Containers

Data Breach Today

In this episode of "Cybersecurity Unplugged," as the use of Kubernetes and cloud containers over traditional forms of storage continues to increase, Nikki Robinson of IBM discusses the benefits of breaking down "complicated environments into something that's tangible and easy to manage.

Cloud 130
article thumbnail

6 Things Every CISO Should Do the First 90 Days on the Job

Dark Reading

A CISO's responsibilities have evolved immensely in recent years, so their first three months on the job should look a different today than they might have several years ago.

135
135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SingTel Confronts Multiple Data Leaks

Data Breach Today

After Optus, Another Australian Subsidiary Reports a Data Breach Telecom giant SingTel is managing multiple data breaches just weeks after Australian subsidiary Optus reported a breach affecting 9.8 million individuals. One of the new breaches is also in Australia. The other stems from a 2021 zero day vulnerability in file transfer application Accellion FTA.

article thumbnail

Does Web3 Matter To Marketers?

John Battelle's Searchblog

Over at LinkedIn I’ve published a short piece on Web3 – a primer of sorts for the many marketing pals who’ve asked me “does this s**t matter!?” As I do with everything I pen, I’ve posted it here as well. (image credit). In the more than 30 years since the digital revolution swept through marketing, most of us have adapted to the ever-present change inherent in what has become a technology-driven profession.

Marketing 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2022 Digital Trust Survey Shows Dedicated Resources Lacking

Data Breach Today

ISACA Leaders Discuss New Report, Techniques to Build and Measure Digital Trust ISACA's State of Digital Trust 2022 survey shows significant gaps between what enterprises are doing and what they should do to earn customer trust in digital ecosystems. While 98% of those surveyed say digital trust is important, only 12% have dedicated staff roles to digital trust.

130
130

More Trending

article thumbnail

US Airport Websites Targeted by Russian KillNet Group

Data Breach Today

KillNet Declared 'War' in May After Thwarted Eurovision Song Contest Attack Self-proclaimed Russian hacktivist group KillNet took responsibility for distributed denial-of-service attacks launched against the public websites of several U.S. airports. It emerged in the wake of Russia's invasion of Ukraine and in May tried to stop online voting for the Eurovision Song Contest.

IT 130
article thumbnail

Pro-Russia group KillNet targets US airports

Security Affairs

The pro-Russia hacktivist group ‘KillNet’ is behind massive DDoS attacks that hit websites of several major airports in the US. The pro-Russia hacktivist group ‘ KillNet ‘ is claiming responsibility for massive distributed denial-of-service (DDoS) attacks against the websites of several major airports in the US. The DDoS attacks have taken the websites offline, users were not able to access it during the offensive.

Access 120
article thumbnail

Feds Warn Healthcare Over Cobalt Strike Infections

Data Breach Today

Red Teaming Tool Poses Ongoing Risks When Used by Hackers, HHS Warns Hackers have appropriated a red teaming tool to hack their way into organizations, warns the Department of Health and Human Services. The number of organizations impacted by a hack involving Cobalt Strike number in the tens of thousands each year.

Risk 130
article thumbnail

US Airports in Cyberattack Crosshairs for Pro-Russian Group Killnet

Dark Reading

Killnet calls on other groups to launch similar attacks against US civilian infrastructure, including marine terminals and logistics facilities, weather monitoring centers, and healthcare systems.

109
109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

eSecurity Planet

A series of distributed denial of service ( DDoS ) attacks today briefly took down the websites of over a dozen U.S. airports, including those for Atlanta and Los Angeles International Airports. The attacks followed a recent Telegram post by the pro-Kremlin hacker group Killnet listing 46 websites to be targeted. Still, as NBC News noted, some of the targets on the list seemed like the result of translation errors – rather than targeting Chicago’s O’Hare Airport website, for example, the hackers

article thumbnail

Zimbra RCE Bug Under Active Attack

Dark Reading

A flaw in unpatched Zimbra email servers could allow attackers to obtain remote code execution by pushing malicious files past filters.

120
120
article thumbnail

Supply Chain Hackers LofyGang Behind Hundreds of Malicious Packages

The Security Ledger

Researchers at Checkmarx say that a cybercriminal group, LofyGang, has targeted the open-source supply chain with hundreds of malicious packages to steal credit card information, stream accounts, and promote hacking tools. The post Supply Chain Hackers LofyGang Behind Hundreds of Malicious Packages appeared first on The Security Ledger with Paul. Read the whole entry. » Related Stories DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition State of Modern Application

article thumbnail

EUROPE: Data protection regulators publish myth-busting guidance on machine learning

DLA Piper Privacy Matters

Authors: Coran Darling , James Clark. In its proposed AI Regulation (“ AI Act ”), the EU recognises AI as one of the most important technologies of the 21 st century. It is often forgotten, however, that AI is not one specific type of technology. Instead, it is an umbrella term for a range of technologies capable of imitating certain aspects of human intelligence and decision-making – ranging from basic document processing software through to advanced learning algorithms.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Complex Impersonation Story

Schneier on Security

This is a story of one piece of what is probably a complex employment scam. Basically, real programmers are having their resumes copied and co-opted by scammers, who apply for jobs (or, I suppose, get recruited from various job sites), then hire other people with Western looks and language skills are to impersonate those first people on Zoom job interviews.

96
article thumbnail

CVE-2022-40684 flaw in Fortinet products is being exploited in the wild

Security Affairs

Fortinet has confirmed that the recently disclosed critical authentication bypass issue (CVE-2022-40684) is being exploited in the wild. Last week, Fortinet addressed a critical authentication bypass flaw, tracked as CVE-2022-40684 , that impacted FortiGate firewalls and FortiProxy web proxies. An attacker can exploit the vulnerability to log into vulnerable devices.

article thumbnail

Putting people at the heart of a digital healthcare system

CGI

There’s no place like home Home truly is where the heart is. It’s a place of familiarity with the people and things around us and, for many of us, it’s the place where we feel most relaxed and happy. The sense of security often means that, when we need support with our health, home can offer one of the most comfortable paths to recovery. The role our homes play in recovery is increasingly coming to the fore; particularly as health and care services face the converging challenge of aging citizens

article thumbnail

The head of the Federal Cyber Security Authority (BSI) faces dismissal

Security Affairs

The German Interior Minister wants to dismiss the head of the Federal Cyber Security Authority (BSI), Arne Schoenbohm, due to possible contacts with Russian security services. German Interior Minister Nancy Faeser wants to dismiss the head of the Federal Cyber Security Authority (BSI), Arne Schoenbohm, due to possible contact with people involved with Russian security services.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Protect Yourself If Your School Uses Surveillance Tech

WIRED Threat Level

Colleges and K-12 campuses increasingly monitor student emails, social media, and more. Here’s how to secure your (or your child’s) privacy.

Privacy 97
article thumbnail

Emotet Rises Again With More Sophistication, Evasion

Dark Reading

An analysis of the malware and its infection strategies finds nearly 21,000 minor and 139 major variations on the malware — complexity that helps it dodge analysis.

IT 122
article thumbnail

CIPL Publishes Ten Recommendations for Regulating AI in Brazil

Hunton Privacy

On October 4, 2022, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published a white paper outlining 10 key recommendations for regulating artificial intelligence (“AI”) in Brazil (the “White Paper”). CIPL prepared the White Paper to assist the special committee of legal experts established by Federal Senate of Brazil (the “Senate Committee”) as it works towards an AI framework in Brazil.

article thumbnail

Consumers have their Say about Protection of Personal Data – Call for More Stringent Controls

Thales Cloud Protection & Licensing

Consumers have their Say about Protection of Personal Data – Call for More Stringent Controls. divya. Tue, 10/11/2022 - 06:46. We live in a digital world in which we engage with significant social, government, retail, business and entertainment services now delivered without any direct human service management. These services require various information from the user, such as username, password and payment information, and retain details of our interactions with the service.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

White House Office of Science and Technology Policy Releases “Blueprint for an AI Bill of Rights”

Hunton Privacy

On October 4, 2022, the White House Office of Science and Technology Policy (“OSTP”) unveiled its Blueprint for an AI Bill of Rights , a non-binding set of guidelines for the design, development, and deployment of artificial intelligence (AI) systems. . The Blueprint comprises of five key principles: . The first Principle is to protect individuals from unsafe or ineffective AI systems, and encourages consultation with diverse communities, stakeholders and experts in developing and deploying AI s

article thumbnail

Creating a vision for a healthier population

CGI

Driven by the pandemic and awakened by evolving social dynamics over the last few years, it is apparent that a focus on health equity, social determinants of health, and behavioral health are essential for a healthier population.

IT 52
article thumbnail

Passkeys: Replace passwords with a safer sign-in method

Jamf

Passwords, move over. Passkeys streamline the authentication process without the burden of password management, all while providing next-generation account security.

article thumbnail

4 data retention challenges you must be able to solve via SC Media

IG Guru

Check out the article here.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them

The Last Watchdog

As digital technologies become more immersive and tightly integrated with our daily lives, so too do the corresponding intrusive attacks on user privacy. Related: The case for regulating facial recognition. Virtual reality (VR) is well positioned to become a natural continuation of this trend. While VR devices have been around in some form since well before the internet, the true ambition of major corporations to turn these devices into massively-connected social “metaverse” platforms has only r

Privacy 198
article thumbnail

Protect 5G to Secure Sustainable Growth

Thales Cloud Protection & Licensing

Protect 5G to Secure Sustainable Growth. divya. Tue, 10/11/2022 - 06:26. The connectivity provided by 5G is revolutionizing our conceptions of connectivity and data flows. These concepts are no longer limited to our mobile devices but are becoming increasingly important to operations in the manufacturing, transportation, and energy sectors. In fact, according to Gartner, the deployment of IoT devices will accelerate from 25 billion in 2023 to 75 billion in 2025. 5G will not only enable these bil

article thumbnail

Sophos XG Firewall Review: Pricing & Features

eSecurity Planet

Bottom Line. Sophos Firewalls are good candidates for mid-sized and distributed enterprises and those already using Sophos’ endpoint protection solution. Dedicated remote branch devices and an easy-to-learn management interface are also strengths. See our complete list of the Best Next-Generation Firewall (NGFW) Vendors. Company Description. Founded in 1985, Sophos addresses endpoint, network, encryption, web, email, and mobile security.