Fri.Jan 19, 2018

article thumbnail

$17.2 Million Settlement for Breach Case Involving HIV Info

Data Breach Today

Aetna's Settlement Points to Need to Pay Attention to Details A mailing error can have huge consequences. Case in point: Aetna has agreed to a $17.2 million settlement of a class action lawsuit filed after a data breach involving HIV drug information that was visible through envelope windows on thousands of letters.

article thumbnail

Security Breaches Don't Affect Stock Price

Schneier on Security

Interesting research: " Long-term market implications of data breaches, not ," by Russell Lange and Eric W. Burger. Abstract : This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies' stock, with a focus on the results relative to the performance of the firms' peer industries, as represented through selected indices rather than the market as a whole.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware: Why Some Victims With Backups Still Pay

Data Breach Today

Leading the latest edition of the ISMG Security Report: Why some organizations with working backups still choose to pay a ransom after suffering a cryptolocking malware attack. Also featured: The U.S. government's push to bolster the private sector's "active defenses.

article thumbnail

Guest Post -- Automation Is Changing the Way We Work

AIIM

Artificial intelligence is changing the way we do everything. As we look ahead, self-driving cars, hyper-intelligent predictive software, and self-improving robots seem possible. As AI progress at a rapid pace, incremental changes in the capability of computer programs changes how we interact with the world, the internet and each other. Already, AI is integrated into our daily lives, from automated suggestions from Amazon based on products we’ve purchased in the best, to automatic email sorting

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Jason's Deli: Hackers Dine Out on 2 Million Payment Cards

Data Breach Today

164 Restaurants Featured Malware Special for 7 Months Jason's Deli is the latest business in the hospitality or retail sector to warn that attackers used malware to steal customers' card details. The restaurant chain says 2 million payment cards were stolen from 164 restaurants during the seven-month breach.

Retail 100

More Trending

article thumbnail

Building a CSOC: Keys to Success

Data Breach Today

When building a next-generation cybersecurity operations center, or CSOC, organizations must first understand their attack profile and determine the scope of threat monitoring needed, says Jagdeep Singh, CISO at Rakuten India, an e-commerce company.

article thumbnail

What is Enterprise Content Management (ECM)?

OpenText Information Management

Enterprise Content Management (ECM) comes in many forms. At its heart, it’s a set of processes, strategies and tools that allow an enterprise to capture, manage, store, preserve, deliver and measure content throughout the enterprise and beyond. In today’s world, information sharing and collaboration with customers, suppliers and other trading partners is essential part of … The post What is Enterprise Content Management (ECM)?

ECM 82
article thumbnail

IT budgets on the rise, driven by software, AI investments

Information Management Resources

Worldwide IT spending will reach $3.7 trillion this year, with the primary drivers of growth being projects in digital business, blockchain, the IoT, machine learning and artificial intelligence.

article thumbnail

Patch your vulnerabilities now or risk punishment under the GDPR

IT Governance

In the wake of the Meltdown and Spectre flaws revealed on 3 January 2018, the Information Commissioner’s Office (ICO) has warned that existing vulnerabilities could lead to punishment when the EU General Data Protection Regulation (GDPR) is enforced. Even though the GDPR won’t take effect until 25 May 2018, organisations failing to identify and patch vulnerabilities before this date face strict disciplinary measures.

GDPR 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Start on the Path to M-12-18 Compliance

Gimmal

The past few years have seen many changes in the ways federal agencies are directed to maintain records, with a particular emphasis on digital records.

article thumbnail

FCC and FTC Enter Memorandum of Understanding to Coordinate Regulation of ISPs

Data Matters

Following the recent adoption of the “Restoring Internet Freedom Order” by the Federal Communications Commission (FCC), the FCC and the Federal Trade Commission (FTC) have entered an agreement to coordinate their cooperation on the regulation of ISPs to protect consumer interest. Background. In February 2015, the FCC adopted the “Open Internet Order,” which reclassified broadband internet service as a common carrier service regulated under Title II of the Communications Act of 1934.

article thumbnail

Why implementing a business continuity management system is essential

IT Governance

Last year, the headlines were laden with cyber attacks and data breaches. In December alone we recorded more than 40 attacks with 33.8 million leaked records, not to mention the infamous global WannaCry ransomware attack in May 2017 left a trail of devastation as organisations were blocked out of their data, halting business operations until a ransom was paid.

article thumbnail

Understanding Supply Chain Cyber Attacks

Dark Reading

While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.

Cloud 52
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 70 (NDC London Edition)

Troy Hunt

It's NDC London! I'm pushing this week's update out a little later due to the different time zones and frankly, due to it being an absolutely non-stop week of events. I talk about those, about how I'm trying to tackle breach disclosures now and about some upcoming events. Next week is Norway and Denmark and I'll be coming to you a little later due to a totally jam-packed Friday, more from me then. iTunes podcast | Google Play Music podcast | RSS podcast.

IT 46
article thumbnail

Kaspersky Lab Seeks Injunction Against US Government Ban

Dark Reading

Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security's decision to prohibit use of its products and services by the feds, the company says.

article thumbnail

Records vs Documents: The Differences & How Best to Manage Them [Video]

Record Nations

Records and documents are actually classified differently in the professional space. Understanding their differences and the best ways to manage them will go a long way in keeping your business organized and secure. Video Transcription Document vs Record Definitions Documents A document refers to “live” information that has not been made final. In short, documents […].

article thumbnail

Enterprise Technologies That Tame GDPR Compliance

eSecurity Planet

The IT and software solutions that help businesses meet the EU's tough new data privacy regulation.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple Preps ChaiOS iMessage Bug Fix, Report

Threatpost

A so-called ‘text bomb’ flaw in Apple’s iPhone and Mac computers that causes devices to crash or restart will be patched next week, according to multiple sources.

article thumbnail

Flexera Corporate Software Inspector: Overview and Analysis

eSecurity Planet

We review Flexera Corporate Software Inspector, a patch management solution for Windows, Mac OS and Red Hat Linux.

53
article thumbnail

Sometimes ERP Looks Perfect, Nothing to Rearrange…

Ascent Innovations

Sometimes ERP Looks Perfect, Nothing To Rearrange…. Upgrading an ERP system or moving to a brand new solution can be a lot like moving to a new city. The biggest difference is that you probably can’t bribe your friends with pizza to help. Such a move does allow you to take stock of your current situation, figure out the items you want to keep (e.g. customer accounts, the afghan knitted by Oma) and throw out those you really have no use for (e.g. old inventory numbers, the six-volume VHS collecti

article thumbnail

SolarWinds Patch Manager: Overview and Analysis

eSecurity Planet

We review SolarWinds Patch Manager, a patch management solution focused on Windows servers and workstations and third-party products.

48
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Pays Researcher Record $112,500 for Android Flaw

Dark Reading

The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google's highest for an Android bug.

44
article thumbnail

BMC BladeLogic Server Automation: Patch Management Overview and Analysis

eSecurity Planet

We review BMC BladeLogic Server Automation, a server configuration tool that also offers patch management for Microsoft, Linux, and other OSes.

44
article thumbnail

Up to 40K Affected in Credit Card Breach at OnePlus

Dark Reading

The smartphone manufacturer has sent an email to anyone who may have been affected in the breach.

article thumbnail

Ivanti Patch: Patch Management Overview and Analysis

eSecurity Planet

We review Ivanti Patch, a range of patch management solutions for small companies through large enterprises.

48
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New Dridex Variant Emerges With An FTP Twist

Threatpost

A recently discovered Dridex campaign had a few peculiar characteristics, including the use of FTP instead of HTTP.

article thumbnail

Micro Focus ZENworks Patch Management: Overview and Analysis

eSecurity Planet

We review Micro Focus ZENworks Patch Management, which manages patches for Mac, Linux, Windows and other operating systems.

44
article thumbnail

China said to test facial-recognition fence in Muslim-heavy area

Information Management Resources

The villages on China’s western frontier are testing biometric systems that alert authorities when targeted people venture more than 1,000 feet beyond designated 'safe areas.'.

37