Thu.Apr 19, 2018

article thumbnail

Facebook and Cambridge Analytica Fallout: What's Next?

Data Breach Today

Abbott Law Group's Steven Teppler on the Repercussions The Facebook/Cambridge Analytica scandal is far from over. Attorney Steven Teppler, co-counsel on the first class action case filed in the matter, discusses the likely repercussions.

100
100
article thumbnail

Looking at Information Management Through a Different Lens

AIIM

Organizations need to think about how the advent of the third wave of exponential change – the drive to Artificial Intelligence and Machine Learning - will require them to look at the future through a different set of lenses. I’d like to offer three of these “lenses” – I’m sure there are more – but I think these three are ones that those in this community are uniquely prepared to tackle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Security Concerns Peaking – With No End In Sight

Threatpost

Despite numerous talks about IoT vulnerabilities at RSAC this week, a clear resolution on fixes is nowhere in sight.

IoT 59
article thumbnail

'Tech Accord' Emphasizes Teamwork to Prevent Hacking Damage

Data Breach Today

Agreement Includes Pledge to Not Aid Governments With Cyber Warfare Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Six eco-friendly RIM tips that could save you money

TAB OnRecord

Protecting the environment can translate into an improved bottom line, from the cost savings associated with resource conservation, to benefits of increased consumer and shareholder confidence. In this blog we will be sharing six ways to incorporate environmentally friendly practices into your organization’s RIM processes. 1. The more you throw away, the more you can [.

More Trending

article thumbnail

The Security Risks of Login With Facebook

WIRED Threat Level

New research from Princeton University exposes vulnerabilities in the social network's universal login API.

Risk 108
article thumbnail

Gartner's Litan on Blockchain

Data Breach Today

Analyst Cuts Through Hype and Details Real-World Uses to Help Fight Fraud Blockchain is high on the hype meter in 2018, but Gartner's Avivah Litan is encouraged by practical applications of the technology to secure financial transactions, protect identity and help organizations fight fraud.

article thumbnail

How DNA Transfer Nearly Convicted an Innocent Man of Murder

WIRED Threat Level

We leave traces of our genetic material everywhere, even on things we’ve never touched. That got Lukis Anderson charged with a brutal crime he didn’t commit.

article thumbnail

Digital Transformation and Cybersecurity's Burden

Data Breach Today

Insights From Jonathan Nguyen-Duy of Fortinet "Digital transformation" is the theme of the year, but it comes with specific cybersecurity challenges - and they put a new burden squarely on the shoulders of the CISO, says Fortinet's Jonathan Nguyen-Duy.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

First Public Demo of Data Breach via IoT Hack Comes to RSAC

Dark Reading

At RSA Conference, Senrio researchers will show how relatively unskilled attackers can steal personally identifiable information without coming into contact with endpoint security tools.

article thumbnail

AI and Machine Learning: More Than Buzzwords?

Data Breach Today

Cybereason's Sam Curry on the Roles for New Technologies The terms artificial intelligence and machine learning are in abundant supply at this year's RSA Conference. Sam Curry of Cybereason cut through the hype to explain how he sees these technologies augmenting cybersecurity.

article thumbnail

3 Eco-friendly RIM tips that could save you money

TAB OnRecord

Protecting the environment can translate into an improved bottom line, from the cost savings associated with resource conservation, to benefits of increased consumer and shareholder confidence. In this blog we will be sharing six ways to incorporate environmentally friendly practices into your organization’s RIM processes. 1. The more you throw away, the more you can [.

article thumbnail

Is Enumerating Resources on a Website "Hacking"?

Troy Hunt

I saw a story pop up this week which made a bunch of headlines and upon sharing it, also sparked some vigorous debate. It all had to do with a 19-year-old bloke in Canada downloading some publicly accessible documents which, as it later turned out, shouldn't have been publicly accessible. Let's start with this video as it pretty succinctly explains the issue in consumer-friendly terms: VIDEO: Nova Scotia's government is accusing a 19-year-old of breaching their government website's secur

Access 69
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What are the benefits of ISO 20000?

IT Governance

ISO 20000 is an IT service management (ITSM) standard that ensures an organisation’s ITSM processes are aligned with international best practice, as well as the needs of the organisation itself. This standard helps organisations benchmark how their managed services are delivered, and how they can measure the service levels and assess their performance.

article thumbnail

Why AI is the key to robust anti-abuse defenses

Elie

This post explains why artificial intelligence (AI) is the key to build anti-abuse defenses that keep up with user expectations and combat increasingly sophisticated attacks. This is the first post of a series of four posts dedicated to provide a concise overview of how to harness AI to build robust anti-abuse protections.

article thumbnail

9 key mistakes organizations make when analyzing data

Information Management Resources

The accessibility and ubiquity of information has led to an increased number of amateur errors in analysis. Here are some of the most common, and how to overcome them.

Access 56
article thumbnail

Use of ‘StegWare’ Increases in Stealth Malware Attacks

Threatpost

Researchers are warning malware payloads can bypass traditional AV protection when delivered buried inside images, documents or even just a pixel.

54
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Pluralsight Course: Modern Web Security Patterns

Troy Hunt

I was chatting to some folks at a bank just the other day about a bunch of modern web security standards. Whilst this blog post is about a Pluralsight course I created with Lars Klint , it only really hit me during that bank conversation just how much there is to take onboard when it comes to securing things in the browser today. Let me paraphrase: Bank: We're thinking of using SRI to protect malicious modification of scripts we load in from a partner.

article thumbnail

Should CISOs Be Hackers?

Dark Reading

Justin Calmus, Chief Security Officer at OneLogin, believes that cybersecurity professionals - including CISOs and other security team leaders - can be much more effective at their jobs if they stay actively engaged with hacking communities that keep them on their toes and give them deep insight into attack trends.

article thumbnail

Chris Vickery Discusses Data Leak of 48 Million Users by Private Intelligence Firm

Threatpost

Private intelligence gathering firm LocalBlox leaked data on 48 million users that was scraped from Facebook, LinkedIn, Zillow and other sites.

Privacy 46
article thumbnail

Successfully Using Deception Against APTs

Dark Reading

According to Illusive CEO Ofer Israeli, deception technology can provide a vital layer of protection from advanced persistent threats (APTs) by presenting attackers with seemingly genuine servers that both divert them from high-value digital assets and make it easier to pinpoint malicious network activity.

IT 44
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Treating cybersecurity like workplace safety

CGI

Treating cybersecurity like workplace safety. pallavi.m@cgi.com. Thu, 04/19/2018 - 02:18. Taking measures to protect employees from workplace accidents seems like an obvious need today, but that was not always the case. Less than half a century ago, there was no Occupational Safety and Health Administration (OSHA). Workers’ compensation laws were passed state by state during the first half of the twentieth century, but before the 1970 law that created OSHA, workers had little recourse to prevent

article thumbnail

Can machine learning improve your endpoint detection and response?

Dark Reading

To intervene with optimum efficiency, response team needs to zero in on the most potentially dangerous endpoint anomalies first. And according to Harish Agastya, VP of Enterprise Solutions at Bitdefender, machine learning-assisted EDR can help you do exactly that.

44
article thumbnail

Cloud document control software and volunteers help nonprofit positively impact society

Info Source

A nonprofit blood bank in Florida is utilizing DocuWare Cloud to store donor records and standard operating procedures manuals. Digital document control speeds up retrieval times, increases staff productivity, and reduces errors. Digital records also facilitate easy compliance with FDA guidelines and reports. The solution is so easy-to-use that the nonprofit can utilize volunteers to digitize records which reduces costs and strengthens community involvement.

Cloud 40
article thumbnail

Protecting Data Anywhere and Everywhere

Dark Reading

SecurityFirst CEO Jim Varner explains how resellers and MSPs can work with their clients to ensure that all of their business-critical data everywhere can be kept safe from attackers and readily available for disaster recovery - even as threats intensify and digital assets are dispersed across multiple clouds.

Cloud 42
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Palette Software launches a new cloud-based Purchase-to-Pay service

Info Source

19 th April 2018 – Palette Software, a leading provider of accounts payable automation and purchase to payment software, has announced the launch of PaletteOnline, a new cloud solution that enables customers to access an end-to-end P2P solution via the cloud, guaranteeing optimal functionality, security and scalability. With PaletteOnline, users gain access to the entire product range included in PaletteArena suite, that enables companies and organizations to save time and costs by automat

Cloud 40
article thumbnail

Using Carrier Intelligence to Validate Mobile User Identity

Dark Reading

To confidently validate the identity of mobile users without adding business-killing friction to login and on-boarding processes, Lea Tarnowski and Wendell Brown of Averon suggest leveraging the intelligence mobile carriers already have about their customers.

42
article thumbnail

NIST releases latest version of its Cybersecurity Framework

Data Protection Report

On April 16, 2018, the National Institute of Standards and Technology (NIST) unveiled Version 1.1 of its widely known Cybersecurity Framework , which incorporates changes based on feedback collected through comments, questions, and workshops held in 2016 and 2017. The Cybersecurity Framework aims to focus on industries vital to national and economic security, including energy, banking, communications, and defense, and provides a universal structure that can be tailored to varied methods of cyber