Thu.Feb 14, 2019

article thumbnail

US Air Force Veteran Charged in Iran Hacking Scheme

Data Breach Today

Monica Witt Allegedly Aided Spear-Phishing Attacks Against US Military A former U.S. Air Force counterintelligence agent was indicted for disclosing classified information and helping Iran compromise the computers of other U.S. intelligence agents. The case marks another damaging leak for the American government.

Military 209
article thumbnail

Blockchain is Real, But Still Not for Everybody

Weissman's World

I have conversations every day with people who believe either (a) blockchain is just another overhyped new technology being foisted upon us by unscrupulous vendors, or (b) it’s the solution to all their problems. Neither of these, of course, is correct. As written and discussed before in this space (and plenty of ‘elsewheres,’ too), blockchain […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Roses are Red, Romance Scammers Make You Blue

Data Breach Today

Don't Fall for Fraudsters or You'll Be Poor and Brokenhearted Too This Valentine's Day, authorities are once again warning individuals to watch out for anyone perpetrating romance scams. The FTC says Americans lost $143 million to romance scams in 2017 while in the U.K., Action Fraud says reported romance scam losses in 2018 topped $64 million.

205
205
article thumbnail

Germany makes its cyber capabilities available for NATO alliance

Security Affairs

Germany announced it is going to make its cyber capabilities available for the NATO alliance to help fight hacking and electronic warfare. Germany is going to share its cyber warfare capabilities with the NATO alliance to protect members of the alliance against hacking and electronic warfare. During the 2016 Warsaw Summit, NATO officially recognised cyberspace as a military operational domain.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Blockchain in Healthcare: The Potential Benefits, Risks

Data Breach Today

Indiana University Health is evaluating the use of blockchain in two areas to improve healthcare information security, Mitch Parker, CISO, says in an interview at the HIMSS19 conference. He sizes up the potential risks and benefits.

More Trending

article thumbnail

Facebook's Fact-Checking Efforts: Can They Be Effective?

Data Breach Today

Sizing Up the Impact of Initiatives to Curb Fake News It's far from clear whether Facebook's latest move to curb fake news in India ahead of the upcoming elections by expanding its engagement with third-party fact checkers will have much impact.

IT 160
article thumbnail

IBM embraces multicloud warehouse availability on AWS, adds elastic SMP

IBM Big Data Hub

The focus on customer needs for greater choice and flexibility is a constant at the IBM Think 2019 conference. Nowhere is this more evident than in IBM Hybrid Data Management, which supports data of any type, source and structure, be it on-premises or in the cloud.

Cloud 88
article thumbnail

How to Create a Dream Team for the New Age of Cybersecurity

Dark Reading

When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.

article thumbnail

SAP security fixes address Critical flaw in SAP HANA XSA

Security Affairs

SAP released a collection of security fixes for February 2019 that address 13 vulnerabilities in its products, including a Hot News flaw in SAP HANA XSA. This week SAP addressed 13 vulnerabilities in its products with the released of the February 2019 set of security fixes, including a Hot News flaw in SAP HANA Extended Application Services (XSA), advanced model.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

USB Cable with Embedded Wi-Fi Controller

Schneier on Security

It's only a prototype, but this USB cable has an embedded Wi-Fi controller. Whoever controls that Wi-Fi connection can remotely execute commands on the attached computer.

IT 80
article thumbnail

Health Sector Council Released Cybersecurity Recommendations for Medical Devices and Health IT

Data Matters

On January 28, 2019, the Healthcare and Public Health Sector Coordinating Council released the “ Medical Device and Health IT Joint Security Plan ” (“JSP” or “Plan”)—cybersecurity recommendations for medical device manufacturers, healthcare information technology vendors, and healthcare providers. U.S. Government entities, including the FDA, participated in the development of the Plan.

article thumbnail

Weekly podcast: Mumsnet, OkCupid and Apple

IT Governance

This week, we discuss a data breach at Mumsnet, no data breach at OkCupid, and a lawsuit against Apple for implementing security measures. Hello, and welcome to the IT Governance podcast for Thursday, 14 February 2019. Here are this week’s stories. The parenting forum Mumsnet has notified users of a data breach after a system update resulted in some account holders being signed in to others’ accounts.

article thumbnail

Digital Transformation Examples: How Data Is Transforming the Hospitality Industry

erwin

The rate at which organizations have adopted data-driven strategies means there are a wealth of digital transformation examples for organizations to draw from. By now, you probably recognize this recurring pattern in the discussions about digital transformation: An industry set in its ways slowly moves toward using information technology to create efficiencies, automate processes or help identify new customer or product opportunities.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

From 'O.MG' to NSA, What Hardware Implants Mean for Security

Dark Reading

A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains.

article thumbnail

How AI and OpenText Magellan can solve your business problems

OpenText Information Management

In this interview from Enterprise World 2018, Ben Poole, Director of Magellan at OpenText™, looks back at how the product has evolved since the launch in 2017, and how OpenText™ Magellan™ can help customers around the world to successfully implement AI in their business operations. According to Ben, everybody needs AI. In the video below, … The post How AI and OpenText Magellan can solve your business problems appeared first on OpenText Blogs.

article thumbnail

Valentine's Emails Laced with Gandcrab Ransomware

Dark Reading

In the weeks leading up to Valentine's Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails.

article thumbnail

Free download: GDPR & ISO 27001 Gap Analysis Tools

IT Governance

While Brexit continues to cause widespread uncertainty, you can at least be sure of one thing: deal or no deal, the security risks your organisation faces won’t go away. Data breaches are on the up, and information security and GDPR compliance remain business-critical issues. That’s why – for a limited time – we’re giving away our EU GDPR Compliance Gap Assessment Tool and ISO 27001 Gap Analysis Tool for free*.

GDPR 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

High Stress Levels Impacting CISOs Physically, Mentally

Dark Reading

Some have even turned to alcohol and medication as their demands outpace resources.

96
article thumbnail

Creating a modern classroom at El Paso Independent School District

Jamf

See how El Paso Independent School District leveled the academic playing field for students by rolling out 27,000 MacBook Air laptops.

77
article thumbnail

Critical OkCupid Flaw Exposes Daters to App Takeovers

Threatpost

The flaw is only one of many romance-related security issues as bad actors take advantage of Valentine's Day.

article thumbnail

Diversity Is Vital to Advance Security

Dark Reading

Meet five female security experts who are helping to move our industry further than ever before.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security

Threatpost

A Threatpost poll found that 52 percent don't feel prepared to prevent a mobile security incident from happening. The results reflect a challenging mobile security landscape.

article thumbnail

New Professional Development Institute Aims to Combat Cybersecurity Skills Shortage

Dark Reading

The (ISC)2 announces a new institute for working cybersecurity professionals to continue their education.

article thumbnail

My Health Record 'minor glitch' still generating thousands of pages of internal files

The Guardian Data Protection

Exclusive: agency in charge wants to charge $14,000 to release details of documents Thousands of pages of internal documents are still being created about a My Health Record technical glitch that the government said was minor and resolved years ago. But the agency in charge of My Health Record wants to charge $14,000 to release details on the files through Australia’s freedom of information regime.

article thumbnail

Security Spills: 9 Problems Causing the Most Stress

Dark Reading

Security practitioners reveal what's causing them the most frustration in their roles.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Coffee Meets Bagel Dating App Warns Users of Breach

Threatpost

The dating site said users' names and email addresses that were added to the system prior to May 2018 may be impacted.

article thumbnail

Learn New Malware-Fighting Tools & Techniques at Black Hat Asia

Dark Reading

There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.

49
article thumbnail

55 5 ? Reviews?

Adam Shostack

I’m getting ready for the 5-year anniversary of my book, “ Threat Modeling: Designing for Security.” As part of that, I would love to see the book have more than 55 5 reviews on Amazon. If you found the book valuable, I would appreciate it if you could take a few minutes to write a review.