Wed.Feb 06, 2019

Data Breach Reports in Europe Under GDPR Exceed 59,000

Data Breach Today

Netherlands, Germany and UK Have Logged the Most Data Breach Reports Since the EU's GDPR went into full effect, European data protection authorities have received over 59,000 data breach reports, with the Netherlands, Germany and the U.K.

Android devices could be hacked by viewing a malicious PNG Image

Security Affairs

Report: Nation-State Malware Attack Could Cripple US

Data Breach Today

Government, Industry Need to Work More Closely on Response Plans Without improved coordination, the U.S.

Security expert Marco Ramilli released for free the Malware Hunter tool

Security Affairs

Malware researcher Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool base on static YARA rules. Malware researcher Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool base on static YARA rules.

Tools 103

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Memo: Nation-State Malware Attack Could Cripple US

Data Breach Today

Government, Industry Need to Work More Closely on Response Plans Without improved coordination, the U.S. government and private companies could be caught flat-footed if malware or a worm hit a software supply chain.

More Trending

A Collaborative Approach to Mitigating Cyberthreats

Data Breach Today

Banks need to work toward improving collaboration between their cybersecurity and fraud management departments to boost efforts to mitigate cyberthreats, say Scott Walters and Eric Reddel of the consultancy Booz Allen Hamilton

Using Gmail "Dot Addresses" to Commit Fraud

Schneier on Security

In Gmail addresses, the dots don't matter. The account "bruceschneier@gmail.com" maps to the exact same address as "bruce.schneier@gmail.com" and "b.r.u.c.e.schneier@gmail.com" -- and so on. Note: I own none of those addresses, if they are actually valid.).

Bolstering the Cybersecurity of Medical Devices

Data Breach Today

As cybersecurity threats in the healthcare sector evolve, medical device manufacturer ICU Medical is taking a number of steps to help safeguard its products. Chaitanya Srinivasamurthy and Marshall Fryman of the company describe these security initiatives

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

We’re just a month and change into the new year, and already there have been two notable developments underscoring the fact that some big privacy and civil liberties questions need to be addressed before continuing the wide-scale deployment of advanced facial recognition systems. This week civil liberties groups in Europe won the right to challenge the UK’s bulk surveillance activities in the The Grand Chamber of the European Court of Human Rights. Related: Snowden on unrestrained surveillance.

Video 127

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Fortinet's Sonia Arista on Securing the Digital Enterprise

Data Breach Today

Listen to the latest on security's role in digital transformation, as well as visibility challenges facing the security industry

There's No Good Reason to Trust Blockchain Technology

WIRED Threat Level

Opinion: Cryptocurrencies are useless. Blockchain solutions are frequently much worse than the systems they replace. Here's why. Opinion Security

HIMSS19: Cybersecurity in the Spotlight

Data Breach Today

A Sampling of What's Slated for Health IT's Biggest Annual Show Once again, cybersecurity issues will be in the spotlight at the Healthcare Information and Management Systems Society Conference, to be held Feb. 11-15 in Orlando, Fla

What Robert Mueller Knows—and Isn't Telling Us

WIRED Threat Level

The special counsel's indictments have so far stopped short tying Trump and his associates to a broader conspiracy, blanks that will eventually get filled in. Security

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

New ExileRAT backdoor used in attacks aimed at users in Tibet

Security Affairs

A malware campaign using new LuckyCat-Linked RAT dubbed ExileRAT has been targeting the mailing list of the organization officially representing the Tibetan government-in-exile.

MacOS Zero-Day Exposes Apple Keychain Passwords

Threatpost

A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program. Mobile Security Vulnerabilities apple Apple bug bug bounty ios macOS zero day

A critical counterfeiting vulnerability addressed in Zcash

Security Affairs

A critical counterfeiting vulnerability in Zcash cryptocurrency could have allowed coining an infinite number of Zcash (ZEC) cryptocurrency. Reading some news, investors could believe that cryptocurrencies are not a good investment.

Over Half of Companies Are Upping Spending on IT Security: eSecurity Planet Survey

eSecurity Planet

Data breaches and new privacy regulations are prompting increased spending on IT security products and staff

Incorporating privacy into data protection strategy

Information Management Resources

Enterprises should start from the top – by incorporating data privacy into the enterprise’s data protection strategy. This will set the direction in which the enterprise will move forward concerning the data privacy initiative. Data privacy Data security Cyber security

Nature and Nurture in Threat Modeling

Adam Shostack

Josh Corman opened a bit of a can of worms a day or two ago, asking on Twitter: “ pls RT: who are the 3-5 best, most natural Threat Modeling minds? Esp for NonSecurity people. adamshostack is a given. ” (Thanks!).

What is Infonomics and Why Should You Care?

Everteam

Is the information your organization captures as important as the physical assets it owns or the money it makes? It should be, but figuring out how to put a value on your information isn’t easy or straightforward.

ROT 70

Organizations must adapt to 'norm' under new data privacy regulations

Information Management Resources

With the increasing value of data, GDPR and California's Consumer Privacy Act of 2018 demonstrate that data privacy policies will continue to be a growing trend in 2019 and beyond. Data privacy Data security GDPR

How to choose the best predictive analytics software in 2019

OpenText Information Management

If only Kodak or Blockbuster could have seen into the future, what would they have done? If they’d had access to the latest predictive analytics solutions, things may have worked out very differently for their companies.

Online shopping a major driver of growth in big data analytics

Information Management Resources

The global big data analytics market is expected to expand at a 12 percent compound annual growth rate (CAGR) between 2017 and 2023, reaching $275 billion by 2023. Big data Analytics Data management

Clever Phishing Attack Enlists Google Translate to Spoof Login Page

Threatpost

A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature. Web Security Credential stuffing Credential Theft Facebook google Google Translate Phishing phishing scam

TD still years away from full AI integration, CEO says

Information Management Resources

A year after buying the artificial intelligence fintech Layer 6, TD Bank is "rewiring how the organization has worked," Gregory Braca says. Artificial intelligence Machine learning Predictive analytics Data science M&A TD Bank

MicroStrategy World: Optimizing Healthcare with Mobile Analytics

Perficient Data & Analytics

Juliet Silver, Chief Strategist for Healthcare , presented on optimizing healthcare operations with mobile analytics. Healthcare Market Forces. There are a number of market forces that influence healthcare. Healthcare is about 17% of our GDP.

Ultimate Software to go private in $11B cash deal

Information Management Resources

Ultimate Software Group said it agreed to be acquired by an investor group led by Hellman & Friedman Capital Partners in a deal valued at about $11 billion. Hardware and software Data management Data strategy

Enterprise Analytics with Perficient, MicroStrategy & Microsoft

Perficient Data & Analytics

MicroStrategy 2019 officially kicked off this week with some major announcements. Several of these offer new and exciting opportunities for enterprises to leverage business intelligence and analytics in truly transformative ways. Kicking things off on Tuesday, Perficient was proud to be named MicroStrategy’s 2019 North America Partner of the Year. The award recognizes our team’s deep, long-term expertise in delivering end-to-end business intelligence (BI) solutions.

Google warns data privacy changes could hurt its business

Information Management Resources

Google parent Alphabet Inc. warned that its business may be damaged by changing data privacy practices, new digital advertising polices and software bugs that leak user information. Data privacy Data security Google

How to manage Microsoft Office 2019 for Mac - Q&A

Jamf

Have questions about managing Microsoft Office for Mac and what its availability in the App Store means for you? We've got (lots) of answers

Microsoft invests in ‘boring AI’ startup valued at $2.75B

Information Management Resources

Databricks Inc., which says it makes software to help companies satisfy their 'boring AI' needs, raised a new round of funding that values the business at $2.75 billion. Data management Artificial intelligence Machine learning

IT 60