Wed.Jul 10, 2019

article thumbnail

Researchers Disclose Vulnerability in Siemens' ICS Software

Data Breach Today

Patch Issued in Light of Concerns Over Stuxnet-Like Attack Against Industrial Systems Researchers at the security firm Tenable uncovered a vulnerability in a Siemens software platform used to manage industrial control systems, and Siemens has issued a patch. The same platform was exploited during the Stuxnet attack a decade ago.

Security 218
article thumbnail

Introducing the largest coordinated release in OpenText history

OpenText Information Management

Today’s market-disrupting technologies are driving new and exciting opportunities to transform the way we live our personal lives, the way we do business, and the way we run our governments. The capacity for organizations to generate and collect information is greater than ever. Harnessing it to its full potential creates an information advantage that reveals … The post Introducing the largest coordinated release in OpenText history appeared first on OpenText Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dear BA and Marriott: Your GDPR Fines Are Important to Us

Data Breach Today

Privacy Regulator's Clear Security Message: Act Now to Avoid 'Disappointment' The data protection gloves have finally come off in Europe after GDPR enforcement began last May - the U.K.'s privacy watchdog has proposed large post-breach sanctions against British Airways and Marriott. Consider the tables now turned on firms that fail to properly safeguard personal data.

GDPR 214
article thumbnail

10 Ways to Keep a Rogue RasPi From Wrecking Your Network

Dark Reading

A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network.

85
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Malware on the High Seas: US Coast Guard Issues Alert

Data Breach Today

Phishing Attack Against International Vessel Triggers Maritime Warnings The U.S. Coast Guard has issued an alert about an increase in malware attacks targeting the networks of commercial vessels. It's warning ship owners to take more cybersecurity precautions.

Phishing 200

More Trending

article thumbnail

Zoom Reverses Course, Removes Local Web Server

Data Breach Today

Controversial Design Decision Could Allow for an Ambush Video Call Video conferencing vendor Zoom has opted to make major changes to its Mac application after a security researcher found several weaknesses in it. The changes come after the researcher refused a bug bounty and instead went public after 90 days, putting pressure on Zoom.

Security 174
article thumbnail

4 Reasons Why SOC Superstars Quit

Dark Reading

Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy.

article thumbnail

Certain Anesthesia Devices Have Vulnerabilities: Researchers

Data Breach Today

GE Healthcare Disputes Some of the Findings; Security Experts Weigh In Authentication vulnerabilities in certain GE Healthcare anesthesia devices could potentially allow remote attackers to meddle with the devices, researchers say. GE disputes some of the findings. Find out what other security experts have to say.

article thumbnail

Details of the Cloud Hopper Attacks

Schneier on Security

Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as "Cloud Hopper," was the subject of a U.S. indictment in December that accused two Chinese nationals of identity theft and fraud. Prosecutors described an elaborate operation that victimized multiple Western companies but stopped short of naming them.

Cloud 79
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Put Those Cloud Security Objections to Rest

Data Breach Today

In the wake of digital transformation, there remain some organizations that - for security reasons - resist the temptation to move to the cloud. What are their objections? Zscaler's Bil Harmer addresses these, as well as the critical questions security leaders should ask of cloud service providers.

Cloud 155
article thumbnail

Financial Firms Face Threats from Employee Mobile Devices

Dark Reading

A new report says that phishing and man-in-the-middle attacks are major risks to financial institutions - via mobile devices in the hands of their employees.

article thumbnail

Fieldwork Software Database Exposed Customer Data: Report

Data Breach Today

Researchers Say Company Promptly Fixed Leak Sensitive information, including credit card and phone numbers, was left exposed to the internet on an unsecured database belonging to Fieldwork Software, which provides cloud-based services to small businesses, researchers note in a new report.

Cloud 149
article thumbnail

The Compliance Mandate is Real as GDPR Enforcement Accelerates

Everteam

Since its implementation in May of 2018, GDPR has been the subject of much discussion but little concrete action by many companies on both sides of the Atlantic. GDPR outlines stringent requirements for data and privacy protection for EU and EEA citizens, but many organizations have struggled to fully understand much less implement compliance programs to meet these requirements.

GDPR 75
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The New Threat Intelligence

Data Breach Today

Threat intelligence programs have evolved greatly over the past decade. But Mario Vuksan, CEO of ReversingLabs, says too many organizations are overlooking the value of local intelligence embedded in their own networks. Vuksan talks about maximizing TI resources.

134
134
article thumbnail

How AI picks the highlights from Wimbledon fairly and fast

IBM Big Data Hub

Note: This blog post was authored by Aaron Baughman with Stephen Hammer, Eythan Holladay, Eduardo Morales and Gary Reiss. Tennis during the Wimbledon Championships fortnight occurs on 18 courts with over 147,000 points contested. In many cases, fans watch one match at a time and catch up on the rest of the tournament by viewing preselected highlights that are generally about popular players.

75
article thumbnail

What’s new in OpenText xECM for Engineering EP6

OpenText Information Management

OpenText™ Extended ECM for Engineering Release 16 EP6 provides improved out of the box reporting and visualization capabilities for controlling execution risk, along with new integrations to Business Intelligence (BI) and third-party reporting tools to help project and operations leaders reduce risk to schedules and production revenue. Extended ECM for Engineering helps Document Control managers, … The post What’s new in OpenText xECM for Engineering EP6 appeared first on OpenText Bl

ECM 74
article thumbnail

How AI picks the highlights from Wimbledon fairly and fast

IBM Big Data Hub

Note: This blog post was authored by Aaron Baughman with Stephen Hammer, Eythan Holladay, Eduardo Morales and Gary Reiss. Tennis during the Wimbledon Championships fortnight occurs on 18 courts with over 147,000 points contested. In many cases, fans watch one match at a time and catch up on the rest of the tournament by viewing preselected highlights that are generally about popular players.

74
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Industry Insight: Checking Up on Healthcare Security

Dark Reading

Modern threats putting healthcare organization at risk, how they're improving their security posture, and where many fall short.

article thumbnail

ROMANIA: Romanian Data Protection Authority issues fine for inappropriate TOMs

DLA Piper Privacy Matters

Just days after proudly announcing its first fine under the GDPR, the Romanian Data Protection Authority has done it again: World Trade Center Bucharest S.A. must pay 15,000 euro for breaching the provisions of Art. 32 para. (4) GDPR corroborated with Art. 32 paras. (1) and (2) GDPR. What happened: according to the official statement posted on the website of the Romanian Authority, a paper-printed list, used in order to check the clients who were having breakfast at the hotel owned by the contro

GDPR 68
article thumbnail

Vulnerability Found in GE Anesthesia Machines

Dark Reading

GE Healthcare has released a statement claiming the bug is not in the machine itself and does not pose direct risk to patients.

Risk 82
article thumbnail

The Schrems Saga Continues: Schrems II Case Heard Before the CJEU

Hunton Privacy

On July 9, 2019, the hearing in the so-called Schrems II case ( case C-311/18 ) took place at the Court of Justice of the European Union (“CJEU”) in Luxembourg. The main parties involved in the proceedings, the Irish Data Protection Commissioner (“Irish DPA”), Facebook Ireland Ltd. and the Austrian activist Max Schrems, presented their arguments to the court.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why You Need a Global View of IT Assets

Dark Reading

It may seem obvious, but many companies lose sight of the fact that they can't protect what they don't know they even have.

IT 82
article thumbnail

Enterprise World 2019—EP6 unlocks the Information Advantage

OpenText Information Management

In my keynote at Enterprise World 2019, I discussed how the latest release of OpenText’s first-class Enterprise Information Management (EIM) platform empowers organizations to unlock the Information Advantage. Fourth industrial revolution technologies are creating a new enterprise landscape and changing the world. Consider 5G, which will make information immediate.

GDPR 60
article thumbnail

Adobe Patch Tuesday updates for July 2019 address only 5 minor flaws

Security Affairs

Adobe Patch Tuesday updates for July 2019 address minor vulnerabilities in the Bridge CC, Experience Manager and Dreamweaver products. Good news for Adobe users, Adobe Patch Tuesday updates for July 2019 address only minor flaws in the Bridge CC, Experience Manager, and Dreamweaver products. Adobe fixed an out-of-bounds memory read issue affecting the Bridge CC on Windows and macOS that can cause information disclosure in the context of the targeted user. “Adobe has released a security upd

article thumbnail

Hotel giant Marriott to be fined £99m for data breach

IT Governance

Marriott International is to be fined £99.2 million for a massive data breach that it disclosed last year. The penalty, levied by the ICO (Information Commissioner’s Office), relates to a cyber attack that occurred in 2014 but was only disclosed last November. The names and contact details of 383 million customers were compromised in the incident, along with millions of password numbers and payment card details.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

GDPR fines: where will BA and Marriott’s £300m go?

The Guardian Data Protection

Newly empowered watchdog flexes muscles by issuing hefty penalties for data breaches The Information Commissioner’s Office (ICO) has for the first time used new powers to punish companies that break laws protecting consumers’ data. British Airways and the Marriott hotel chain were the first firms targeted by the watchdog, which handed them fines totalling almost £300m.

GDPR 59
article thumbnail

Agent Smith Malware Infects 25M Android Phones to Push Rogue Ads

Threatpost

Researchers say malware infects phones in order to sneak ads on devices for profit.

article thumbnail

Announcing Extended ECM Documentum for SAP Solutions

OpenText Information Management

The majority of processes that take place inside SAP rely on content to some extent. With OpenText™ Extended ECM Documentum for SAP® Solutions, we make it easier to work with that content by allowing customers to view content stored in OpenText™ Documentum™ inside the SAP user interface. And vice versa, customers can also view SAP … The post Announcing Extended ECM Documentum for SAP Solutions appeared first on OpenText Blogs.

ECM 58