Thu.May 17, 2018

article thumbnail

White House Eliminates Cybersecurity Position

Schneier on Security

The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea.

article thumbnail

Clearing the Complication - Making Machine Learning and Artificial Intelligence Accessible and Useful

AIIM

These days it feels almost impossible to have a conversation with anyone involved in the world of Information Management without bringing up machine learning and artificial intelligence. Everyone is talking about it, everyone has an opinion, everyone claims to be doing it — or at least thinking about doing it. AI is part of the popular zeitgeist, entering our lives in the form of autonomous vehicles on our roads, Alexa in our homes, and a burgeoning AI arms race between rival world powers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIS Regulations: Adopt a “human-first approach” to compliance

IT Governance

Organisations should take a “human-first approach” to preparing for the Directive on security of network and information systems (NIS Directive) , the new law designed to help ensure that essential services remain operational, says the co-founder and chief technology officer of Cofense. The UK government has transposed the NIS Directive into national law, the official title of this law will be The Network and Information Systems Regulations 2018 (NIS Regulations) as of 10 May 2018.

article thumbnail

Health Data Breach Tally: The Latest Additions

Data Breach Today

Largest Incident: Break-In at California State Agency That Affected 582,000 The number of health data breach victims added to the official federal tally so far in 2018 has doubled in recent weeks to more than 2 million. The largest breach of the year so far involved a break-in at a California government office.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps. Fast-forward a little bit and you’ll remember telling your teachers that your dog really did eat your homework.

IT 81

More Trending

article thumbnail

Get Ready for 'WannaCry 2.0'

Dark Reading

Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.

95
article thumbnail

As Payments Speed Up, How Can Fraud Be Minimized?

Data Breach Today

Knowing as many details as possible about the customer, the payment and the recipient is a critical component of stopping fraud as payments become faster, says anti-fraud specialist David Barnhardt.

112
112
article thumbnail

Cracking 2FA: How It's Done and How to Stay Safe

Dark Reading

Two-factor authentication is a common best security practice but not ironclad. Here's how it can be bypassed, and how you can improve security.

IT 86
article thumbnail

Are Facebook's Election-Related Moves in India Meaningful?

Data Breach Today

Security Practitioners Weigh In on Actions of Social Media Giant Facebook has taken several moves aimed at minimizing misuse of social media during the 2019 elections in India. But are the actions merely a marketing maneuver, or could they have a real impact?

Marketing 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Gruesome Jihadi Content Still Flourishes on Facebook and Google+

WIRED Threat Level

Despite improvements to algorithmic filtering, Facebook and Google+ still host scores of ISIS and related content and accounts that sometimes stay up for months.

article thumbnail

Weekly podcast: myPersonality, train Wi-Fi and Kaspersky Lab

IT Governance

This week, we discuss the exposure of millions of Facebook users’ data, security failings in train passenger networks and Kaspersky Lab’s relocation to Switzerland. Hello and welcome to the IT Governance podcast for Friday, 18 May 2018. Here are this week’s stories. New Scientist magazine reports that data relating to millions of Facebook users who used a personality quiz app was exposed online for four years.

article thumbnail

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

On May 8, Georgia Governor Nathan Deal announced that he was vetoing Senate Bill 315 (“SB 315” or “the bill”), cybersecurity legislation that would have expanded the criminalization of “unauthorized computer access” to capture, in addition to traditional hacking, activity that opponents warned is necessary to robust private and public sector cyber defense.

article thumbnail

Secure Cloud Migration and the Cloud Security Alliance

Thales Cloud Protection & Licensing

For many years, Thales eSecurity has been a solution provider member of the Cloud Security Alliance (CSA), a global organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment 1. Among CSA’s many activities is its research arm, which include 34 working groups, one of which is called Security Guidance.

Cloud 54
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Your enterprise information security budget is too small

OpenText Information Management

The largest information security and digital risk conference in the world, RSAC 2018, recently descended on the Moscone Center in San Francisco for a packed week on all things cyber security. It was a lively conference and many of the smartest experts in the industry came together to discuss how they see the landscape around … The post Your enterprise information security budget is too small appeared first on OpenText Blogs.

article thumbnail

Weekly Update 87

Troy Hunt

We're on a beach! It's the day after 3 pretty intense days of NDC conference and the day before Scott heads back to the UK so beach was an easy decision. The conference went fantastically well and, in all honesty, was the most enjoyable workshop I think I've done out of ~50 of them these last few years. NDC will be back on the Gold Coast next yet, plus of course it will be in Oslo in a few weeks' time then Sydney in September where we'll both do it all again.

IT 51
article thumbnail

The Risks of Remote Desktop Access Are Far from Remote

Dark Reading

RDP is used by fraudsters to steal and monetize data more often than you might think. But there are ways to stay safe.

Access 64
article thumbnail

‘Voice-Squatting’ Turns Alexa, Google Home into Silent Spies

Threatpost

A team of academic researchers has demonstrated that it's possible to possible to closely mimic legitimate voice commands in order to carry out nefarious actions on these home assistants.

IT 49
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

11 Top Managed Security Service Providers (MSSPs)

eSecurity Planet

Our guide to the top managed security service providers (MSSPs), based on their ratings in analyst reports the Gartner Magic Quadrant and the IDC MarketScape Vendor Assessment.

article thumbnail

New Pluralsight Course: The Role of Shadow IT and How to Bring it out of the Darkness

Troy Hunt

It's a new Pluralsight course! Yes, I know I said that yesterday too , but this is a new new Pluralsight course and it's the second part in our series on Creating a Security-centric Culture. As I wrote there back in Jan, we're doing this course on a quarterly basis and putting it out in front of the paywall so in other words, it's free! It's also a combination of video and screencast which means you see a lot of this: As for the topic in the title, shadow IT has always been an interesting one an

IT 48
article thumbnail

Why Isn't Integrity Getting the Attention It Deserves?

Dark Reading

A focus on integrity requires a shift in the way many approach security management, but it's one of the most promising approaches to effective enterprise security.

IT 48
article thumbnail

Once Bitten, Twice Shy

Gimmal

Below is a blog post written by Carla Mulley, Vice President of Marketing at Concept Searching. Concept Searching and Gimmal are working together to offer more intelligent records management capabilities to organizations of all sizes.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EUROPE: Are GDPR fines insurable in the countries where you operate?

DLA Piper Privacy Matters

DLA Piper and Aon have launched a guide ‘ The price of data security ‘, ahead of the General Data Protection Regulation (GDPR), effective from 25 May 2018. The guide reviews the insurability of GDPR fines across Europe, which can reach up to €20 million or, if higher, up to 4% of a group’s annual global turnover. It also looks at insurability of costs associated with GDPR non-compliance (e.g. litigation, investigation and compensation), as well as the insurability of non-GDPR r

article thumbnail

California Teen Arrested for Phishing Teachers to Change Grades

Dark Reading

The student faces 14 felony counts for using a phishing campaign to steal teachers' credentials and alter students' grades.

article thumbnail

Fake Fortnite Apps for Android Spread Spyware, Cryptominers

Threatpost

An array of malicious Android apps purporting to be popular game Fortnite are instead harvesting call logs and downloading cryptomining malware.

article thumbnail

Boosting Security Effectiveness with 'Adjuvants'

Dark Reading

How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

State Attackers Moving from Stealing Data to Social Meddling

Ascent Innovations

State Attackers Moving from Stealing Data to Social Meddling. The new cyber intelligence report expects the monetary benefits will allure the use of crypto-mining malware and cryptocurrencies by cyber attackers this year. The cyber state attacker force is growing at an alarming rate. New bad actors. Few unexpected nation states are rising in the ranks of sponsored attackers, including spying on thousands of people across 20 countries via an Android malware campaign, and another one infiltrated R

article thumbnail

CenturyLink Managed Security Services: Overview and Analysis

eSecurity Planet

We review CenturyLink's Managed Security Services, which monitor 1.3 billion security events per day and serve customers in 60 different countries.

article thumbnail

Cloud Storage: Because A Smoke Detector in the Server Room Is Not A Good Contingency Plan

Ascent Innovations

Cloud Storage: Because A Smoke Detector in the Server Room Is Not A Good Contingency Plan. Let me preface this by saying there are three things you should know about me: 1. I’m an avid auto enthusiast. 2. I love learning how things are made. 3. I generate “what-if” scenarios in my brain to a concerning extent. Technology is not the only change your company encounters.

Cloud 40