Tue.Nov 12, 2019

Microsoft Will Apply California's Privacy Law Nationwide

Data Breach Today

Company's Move Could Influence Other Technology Companies Microsoft will apply the core rights of the California Consumer Privacy Act across all its customers in the U.S., which could nudge other technology companies in the same direction as online privacy becomes an increasing concern.

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

There’s little doubt that the shift to quantum computing will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Related: The ‘post quantum crytpo’ race is on This isn’t coming as any surprise to IT department heads.

New Ransomware-as-a-Service Offered at Deep Discount: Report

Data Breach Today

McAfee: Creators of 'Buran' Ask for Smaller Percentage of Ransoms Collected A new ransomware-as-a-service model dubbed "Buran" that targets vulnerabilities in certain devices running Windows is offered at a deep discount to help the malware spread faster, according to McAfee researchers

Facebook is secretly using iPhone’s camera as users scroll their feed

Security Affairs

New problems for Facebook, it seems that the social networking giant is secretly using the camera while iPhone users are scrolling their feed. Is this another privacy issue for Facebook?

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Privacy Analysis: Google Accesses Patient Data on Millions

Data Breach Today

Massive Research Project With Ascension Health System Raises Concerns A newly disclosed collaboration between Google and the massive Ascension healthcare system that the partners say is designed to improve patient care is raising serious privacy concerns.

Access 158

More Trending

Labour Party Hit by Massive Online Attack Attempt

Data Breach Today

No Systems Compromised, But Campaigning Disrupted, UK Party Officials Report The U.K. Labour Party says its systems were hit by a large-scale online attack that disrupted access to some campaigning systems, but led to no breach.

Access 130

Identifying and Arresting Ransomware Criminals

Schneier on Security

The Wall Street Journal has a story about how two people were identified as the perpetrators of a ransomware scheme. They were found because -- as generally happens -- they made mistakes covering their tracks.

Verizon: Companies Failing to Maintain PCI DSS Compliance

Data Breach Today

Many companies around the world that accept card payments are failing to continually maintain compliance with the PCI Data Security Standard, according to the new Verizon 2019 Payment Security Report. Verizon's Rodolphe Simonetti, who contributed to the report, explains the findings

#COBOL60: Your COBOL questions, answered – Part Three

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel.

IT 66

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Identity Fraud: Account Origination

Data Breach Today

Bala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses


All About Machine Learning with Oracle Analytics

Perficient Data & Analytics

Perficient Presents at Oracle OpenWorld 2019 – Live from the show floor, a director in our analytics team delivers an overview of the machine learning capabilities of Oracle Analytics Cloud with its built-in ML algorithms. Machine Learning is a science that existed for several decades.

CCPA Compliance: Identity Verification Challenges

Data Breach Today

One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues

Introducing OpenText Core for Federated Compliance

OpenText Information Management

Holistic, cross-enterprise information governance has long been the vision for records administrators coping with large-scale enterprise content.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Microsoft Patches IE Zero-Day Among 74 Vulnerabilities

Dark Reading

The November Patch Tuesday update fixed 13 critical flaws, including a zero-day bug in Internet Explorer


How SAP moved 80,000 mobile devices to Jamf Pro


Phillipp Pinkernelle, IT Technology Consultant at SAP, discusses how SAP moved 80,000 devices from one mobile device management (MDM) solution to Jamf Pro

MDM 81

Siemens and IBM showcase an AI-based, CO2 friendly advisor

IBM Big Data Hub

Making the case for AI, or any nascent technology for that matter, can be a struggle for companies today.


How SAP moved 80,000 mobile devices to Jamf Pro


Phillipp Pinkernelle, IT Technology Consultant at SAP, discusses how SAP moved 80,000 devices from one mobile device management (MDM) solution to Jamf Pro

MDM 81

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

What’s new in OpenText Documentum for Life Sciences Release 16 EP7

OpenText Information Management

Every pharmaceutical company wants to accelerate the drug development process – from discovery to commercial success – to deliver new treatments that improve patient outcomes.

AI, Records, and Accountability

ARMA International

This article is part of a collaboration between ARMA and AIEF and is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November. A printed version of the special issue will be available as well, for a nominal fee. Introduction.

Buran ransomware-as-a-service continues to improve

Security Affairs

The recently discovered ransomware-as-a-service (RaaS) Buran attempts to gain popularity by offering discounted licenses. In May, researchers from McAfee’s Advanced Threat Research Team discovered a new piece of ransomware named ‘Buran.’

Announcing OpenText Content Services Release 16 EP7

OpenText Information Management

OpenText™ Content Services help connect content to digital business to accelerate productivity, improve governance and drive digital transformation.

TA505 Cybercrime targets system integrator companies

Security Affairs

The analysis of a malicious email revealed a possible raising interest of the TA505 cybercrime gang in system integrator companies. Introduction. During a normal monitoring activity, one of the detection tools hits a suspicious email coming from the validtree.com domain.

Announcing OpenText OT2 19.4

OpenText Information Management

The use of SaaS applications is on the rise and experts believe that 75% of all applications will be SaaS-powered by 2020. One reason for this is that many SaaS platforms utilize machine learning and algorithms to automate processes.

EU: New Guidelines on the concepts of controller, processor and joint controllership

DLA Piper Privacy Matters

On 7 November, the European Data Protection Supervisor issued a set of guidelines that could be used by organisations to determine whether they act as controller, processor or joint controller. The Guidelines also contain easy-to-use checklists as well as a flowchart.

Intel Failed to Fix a Hackable Chip Flaw Despite a Year of Warnings

WIRED Threat Level

Speculative execution attacks still haunt Intel, long after researchers told the company what to fix. Security Security / Cyberattacks and Hacks

Reimagining data governance in the age of AI and machine learning

Information Management Resources

Like conventional methods, new architectures should also serve the principles of trust, data quality and overall protection of data, but they need to be reimagined for the current context organizations find themselves in

While CISOs Fret, Business Leaders Tout Security Robustness

Dark Reading

A new Nominet survey shows a familiar disconnect between business and security teams on the matter of cyber preparedness