Tue.Nov 12, 2019

Microsoft Will Apply California's Privacy Law Nationwide

Data Breach Today

Company's Move Could Influence Other Technology Companies Microsoft will apply the core rights of the California Consumer Privacy Act across all its customers in the U.S., which could nudge other technology companies in the same direction as online privacy becomes an increasing concern.

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

There’s little doubt that the shift to quantum computing will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Related: The ‘post quantum crytpo’ race is on This isn’t coming as any surprise to IT department heads.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Privacy Analysis: Google Accesses Patient Data on Millions

Data Breach Today

Massive Research Project With Ascension Health System Raises Concerns A newly disclosed collaboration between Google and the massive Ascension healthcare system that the partners say is designed to improve patient care is raising serious privacy concerns.

Access 191

Facebook is secretly using iPhone’s camera as users scroll their feed

Security Affairs

New problems for Facebook, it seems that the social networking giant is secretly using the camera while iPhone users are scrolling their feed. Is this another privacy issue for Facebook?

Access 114

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

New Ransomware-as-a-Service Offered at Deep Discount: Report

Data Breach Today

McAfee: Creators of 'Buran' Ask for Smaller Percentage of Ransoms Collected A new ransomware-as-a-service model dubbed "Buran" that targets vulnerabilities in certain devices running Windows is offered at a deep discount to help the malware spread faster, according to McAfee researchers

More Trending

Labour Party Hit by Massive Online Attack Attempt

Data Breach Today

No Systems Compromised, But Campaigning Disrupted, UK Party Officials Report The U.K. Labour Party says its systems were hit by a large-scale online attack that disrupted access to some campaigning systems, but led to no breach.

Mexican state-owned oil company Pemex hit by ransomware

Security Affairs

On S unday , the Mexican state-owned oil company Petróleos Mexicanos (Pemex) was infected with the DoppelPaymer ransomware. On Sunday, a piece of the DoppelPaymer ransomware infected systems of the Mexican state-owned oil company Petróleos Mexicanos (Pemex) taking down part of its network.

Verizon: Companies Failing to Maintain PCI DSS Compliance

Data Breach Today

Many companies around the world that accept card payments are failing to continually maintain compliance with the PCI Data Security Standard, according to the new Verizon 2019 Payment Security Report. Verizon's Rodolphe Simonetti, who contributed to the report, explains the findings

Identifying and Arresting Ransomware Criminals

Schneier on Security

The Wall Street Journal has a story about how two people were identified as the perpetrators of a ransomware scheme. They were found because -- as generally happens -- they made mistakes covering their tracks.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

CCPA Compliance: Identity Verification Challenges

Data Breach Today

One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues

EU: New Guidelines on the concepts of controller, processor and joint controllership

DLA Piper Privacy Matters

On 7 November, the European Data Protection Supervisor issued a set of guidelines that could be used by organisations to determine whether they act as controller, processor or joint controller. The Guidelines also contain easy-to-use checklists as well as a flowchart.

Identity Fraud: Account Origination

Data Breach Today

Bala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses

118
118

#COBOL60: Your COBOL questions, answered – Part Three

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel.

IT 81

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?

Dark Reading

The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change

IT 81

As 5G Rolls Out, Troubling New Security Flaws Emerge

WIRED Threat Level

Researchers have identified 11 new vulnerabilities in 5G—with time running out to fix them. Security Security / Security News

First multi-million GDPR fine in Germany: €14.5 million for not having a proper data retention schedule in place

Data Protection Report

On October 30, 2019 the Berlin Commissioner for Data Protection and Freedom of Information ( Berliner Beauftragte für Datenschutz und Informationsfreiheit – Berlin DPA ) issued a €14.5

GDPR 109

Intel Failed to Fix a Hackable Chip Flaw Despite a Year of Warnings

WIRED Threat Level

Speculative execution attacks still haunt Intel, long after researchers told the company what to fix. Security Security / Cyberattacks and Hacks

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

AI, Records, and Accountability

ARMA International

This article is part of a collaboration between ARMA and AIEF and is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November. A printed version of the special issue will be available as well, for a nominal fee. Introduction.

Microsoft Patches IE Zero-Day Among 74 Vulnerabilities

Dark Reading

The November Patch Tuesday update fixed 13 critical flaws, including a zero-day bug in Internet Explorer

72

Siemens and IBM showcase an AI-based, CO2 friendly advisor

IBM Big Data Hub

Making the case for AI, or any nascent technology for that matter, can be a struggle for companies today.

102
102

The Myths of Multifactor Authentication

Dark Reading

Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Introducing OpenText Core Experience Insights

OpenText Information Management

According to Forrester Research, 63% of marketers use some sort of journey mapping. Yet customer journeys are more complex than ever, requiring more one-to-one personalization across many touchpoints and experiences.

Buran ransomware-as-a-service continues to improve

Security Affairs

The recently discovered ransomware-as-a-service (RaaS) Buran attempts to gain popularity by offering discounted licenses. In May, researchers from McAfee’s Advanced Threat Research Team discovered a new piece of ransomware named ‘Buran.’

The Latest Innovation to Unlock the Information Advantage

OpenText Information Management

The OpenText™ November 2019 launch, announced at our Enfuse digital security conference, demonstrates our commitment to securing your information. For us, security is job #1.

While CISOs Fret, Business Leaders Tout Security Robustness

Dark Reading

A new Nominet survey shows a familiar disconnect between business and security teams on the matter of cyber preparedness

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Reimagining data governance in the age of AI and machine learning

Information Management Resources

Like conventional methods, new architectures should also serve the principles of trust, data quality and overall protection of data, but they need to be reimagined for the current context organizations find themselves in

Introducing OpenText Core for Federated Compliance

OpenText Information Management

Holistic, cross-enterprise information governance has long been the vision for records administrators coping with large-scale enterprise content.

Researchers Disclose New Vulnerabilities in Windows Drivers

Dark Reading

Attackers could take advantage of simple design flaws in widely distributed drivers to gain control over Windows systems

59