Mon.Aug 06, 2018

article thumbnail

Atlanta's Reported Ransomware Bill: Up to $17 Million

Data Breach Today

City Didn't Pay Ransom, But Spends for Cleanup, New Devices, Better Security The cost of the city of Atlanta's mitigation and subsequent IT overhaul following a massive SamSam ransomware infection in March could reach $17 million, of which $6 million has already been budgeted for new devices, security enhancements as well as upgrades, according to news reports.

Cleanup 182
article thumbnail

Do you have a data breach response plan?

IT Governance

The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic! The Ponemon Institute Cost of a Data Breach Study 2018 indicates that one in four organisations will suffer a data breach in the next two years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Big Data Analytics: Taking a Predictive Security Stance

Data Breach Today

Carbon Black's Matt Bennet Shares Insights on Making Big Data Meaningful Big data holds the key to moving from a preventive security stance to a more predictive stance, says Matthew Bennett of Carbon Black.

Big data 124
article thumbnail

Spot the Bot: Researchers Open-Source Tools to Hunt Twitter Bots

Dark Reading

Duo security researchers compiled a massive dataset of public Twitter profiles and built a tool to scour profiles and detect the fakes.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Amazon's Healthcare Expansion: Analyzing Privacy Concerns

Data Breach Today

As Amazon expands its activities in healthcare, include a high-profile venture into the pharmacy business, the online retail giant will face a wide variety of important privacy issues, attorneys Jeffrey Short and Todd Nova explain.

Privacy 100

More Trending

article thumbnail

Election Security Insights From Former Federal CISO

Data Breach Today

Retired Brigadier General Gregory Touhill, the first CISO of the federal government, spells out what he sees as the essential steps for fighting against Russian meddling in this year's midterm elections. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.

Security 100
article thumbnail

The heat is on, is your school #BreachReady?

IT Governance

Welcome to the new education sector blog series. In our first blog ( sign up to the series here ) , we explore data breaches. We will consider why they happen, what you can do to reduce their likelihood and impact as well as which breaches need reporting to the supervisory authority and what information they will need from you. The human factor. Across all sectors and organisation sizes, simple mistakes such as emailing and posting or faxing information to the wrong people top the Information

article thumbnail

Hacking the McDonald's Monopoly Sweepstakes

Schneier on Security

Long and interesting story -- now two decades old -- of massive fraud perpetrated against the McDonald's Monopoly sweepstakes. The central fraudster was the person in charge of securing the winning tickets.

article thumbnail

What is business continuity/ISO 22301 and why do you need it?

IT Governance

You might already have a BCP (business continuity plan) – or other contingency plan – in place in the event of a disruptive incident, such as a natural disaster. However, because these plans aren’t necessarily based on a proper risk analysis, they can become outdated quickly, leaving your organisation vulnerable should disaster strike. This is where an effective BCMS (business continuity management system) can vastly improve things.

IT 56
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mastering MITRE's ATT&CK Matrix

Dark Reading

This breakdown of Mitre's model for cyberattacks and defense can help organizations understand the stages of attack events and, ultimately, build better security.

article thumbnail

Dept. of Energy announced the Liberty Eclipse exercise to test electrical grid against cyber attacks

Security Affairs

DoE announced the Liberty Eclipse exercise to test the electrical grid ‘s ability to recover from a blackout caused by cyberattacks. This is the first time the Department of Energy will test the electrical grid’s ability to recover from a blackout caused by cyberattacks. We have discussed many times the effects of a cyber attack against an electrical grid, the most scaring scenario sees wide power outage bringing population in the dark.

article thumbnail

Dark Reading News Desk Live at Black Hat USA 2018

Dark Reading

Watch here Wednesday and Thursday, 2 p.m. - 6 p.m. Eastern Time to see over 40 live video interviews with straight from the Black Hat USA conference in Las Vegas.

54
article thumbnail

TCM Bank: website misconfiguration exposed applicant data for 16 months

Security Affairs

TCM Bank announced that a Web site misconfiguration exposed applicant data for 16 months, between early March 2017 and mid-July 2018. TCM Bank , a subsidiary of ICBA Bancard, serves as a trusted advisor to community banks, it serves as a direct issuer of credit cards for more than 750 small and community U.S. banks who prefer not to issue cards themselves.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Only one in three AI projects reported to succeed

Information Management Resources

IT execs point to inconsistent data, incompatible technologies and organizational silos as major impediments.

IT 70
article thumbnail

New Pluralsight Course: Bug Bounties for Researchers

Troy Hunt

Earlier this year, I spent some time in San Fran with friend and Bugcrowd founder Casey Ellis where we recorded a Pluralsight "Play by Play" titled Bug Bounties for Companies. I wrote about that in the aforementioned post which went out in May and I mentioned back then that we'd also created a second course targeted directly at researchers. We had to pull together some additional material on that one but I'm please to now share the finished product with you: Bug Bounties for Researchers.

IT 45
article thumbnail

How to configure Internet Connection Sharing between Mac OS X and a Hak5 WiFi Pineapple

Architect Security

Mac OS X can provide the Hak5 WiFi Pineapple with Internet connectivity for connected clients, but setting this up does require configuration of the Pineapple network configuration file before it will work. This is a step beyond what Windows and Linux users have to do. This may not be the only solution, but it’s one that […].

IT 45
article thumbnail

HP releases firmware updates for two critical RCE flaws in Inkjet Printers

Security Affairs

HP has released firmware updates that address two critical remote code execution vulnerabilities in some models of inkjet printers. HP has released firmware updates to address two critical RCE flaws affecting some Inkjet printers. The two flaws, tracked as CVE-2018-5924 and CVE-2018-5925, could be exploited by attackers to trigger stack or static buffer overflow.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EU / GDPR People Search – Still Possible!

Architect Security

[link] [link] [link] [link] [link] [link] [link] [link] [link] Do not underestimate personally shared/social media data People still want to share information about themselves with the word #Intelligence #OSINT #PeopleSearch #SocialEngineering.

GDPR 45
article thumbnail

Fortnite APK is coming soon, but it will not be available on the Google Play Store

Security Affairs

Fortnite, the most popular game will be soon available for Android users but the Fortnite APK will not be in the Play Store. Fortnite continues to be the most popular game, it is a co-op sandbox survival game developed by Epic Games and People Can Fly. The great success obtained by the Fortnite attracted cyber criminals that are attempting to exploit its popularity to target its fans.

IT 43
article thumbnail

Successfully Completing your Terminal Degree

IG Guru

I finished a Doctorate of Computer Science just over a month ago. While it is still fresh on my mind, need to share my experiences and explain which qualities make for the person who will finish. Remember, ABD (All But Dissertation) is not the completion. When a person is ABD, their highest level of education […]. The post Successfully Completing your Terminal Degree appeared first on IG Guru.

article thumbnail

Utilities Digital Journey Insights (Part 1): Why are utilities playing catch-up in the race to digitally transform?

CGI

Utilities Digital Journey Insights (Part 1): Why are utilities playing catch-up in the race to digitally transform? pallavi.m@cgi.com. Mon, 08/06/2018 - 22:48. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. The findings and perspectives are based on 1,400 in-person interviews with business and IT executives, of which 127 are from the utilities industry.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CANADA IS USING ANCESTRY DNA WEBSITES TO HELP IT DEPORT PEOPLE

IG Guru

By Tamara Khandaker Jul 26, 2018 In another example of the extraordinary lengths Canadian immigration officials go to deport migrants, the Canada Border Services Agency has been collecting their DNA and using ancestry websites to find and contact their distant relatives and establish their nationality. “I think it is a matter of public interest that border service […].

IT 40
article thumbnail

Episode 107: What’s Hot at Black Hat & does DHS need its new Risk Management Center?

The Security Ledger

In this episode of The Security Ledger Podcast (#107): Hacker Summer Camp takes place in Las Vegas this week as the Black Hat, DEFCON and B-Sides conferences take place. We’re joined by DigiCert Chief Technology Officer Dan Timpson to talk about the presentations that are worth seeing. And, in our second segment, The Department of Homeland. Read the whole entry. » Related Stories Podcast: Infosec has a #MeToo Problem also TOR-ifying Wikipedia Exploits in Samsung Hub Put Smart Homes at

article thumbnail

The Quest for Optimal Security

The Falcon's View

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a product class, specific framework/standard, or to best align with specific technologies (legacy/traditional infrastructure, cloud, etc.). Given all the competing advice out there, I often find it's hard to suss out exactly what one should be doing.

article thumbnail

Overview of Thailand Draft Personal Data Protection Act

Data Protection Report

Data protection laws in Asia continue to be introduced and updated. One of the most recent developments in South East Asia is in Thailand. On 22 May 2018, the Thai Cabinet approved in principle a revised draft of Thailand’s first personal data protection act (Draft Act). This Draft Act is currently under consideration by the Council of State. Thailand currently does not have any specific law regulating data protection.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Top iPhone Supplier Battles WannaCry Infection

Threatpost

Production lines were halted for two days, and the effects to the global supply chain for mobile phones could be felt for the third quarter and beyond.

43
article thumbnail

Top 10 Talks to See at Black Hat USA 2018

eSecurity Planet

Security researchers, vendors and IT pros are headed for Las Vegas for Black Hat USA 2018. Here are 10 talks that shouldn't be missed.

article thumbnail

IT Managers: Are You Keeping Up with Social-Engineering Attacks?

Dark Reading

Increasingly sophisticated threats require a mix of people, processes, and technology safeguards.

IT 49