Tue.Mar 05, 2019

article thumbnail

Health Data Hacking Incident Affects 400,000

Data Breach Today

Columbia Surgical Specialists of Spokane Reports Breach Columbia Surgical Specialists of Spokane has reported a breach impacting 400,000 individuals, the largest added to the federal health data breach tally so far in 2019. Meanwhile, a medical center in Chicago has also reported a major breach.

article thumbnail

[Podcast] Artificial Intelligence - What the Research Data REALLY Means

AIIM

No matter where you turn, it seems you can't help but run into discussion about Artificial Intelligence being the future of Intelligent Information Management. In fact, when we surveyed the AIIM Community about it and found that: 81% of organizations reported that Deep Learning and Machine Learning are key to their future technology and business planning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Consumer Privacy: Reasons for Optimism As Well As Concern

Data Breach Today

ACLU's Jon Callas Briefs RSA Conference on Evolution of Privacy Discussion At the start of RSA Conference 2019, Jon Callas of the ACLU discusses how attitudes toward privacy continue to evolve and why the general tenor of the conversation is not as bad as some headlines suggest.

Privacy 229
article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices and communications of terrorists and criminals. On the other are almost every cryptographer and computer security expert, repeatedly explaining that there's no way to provide this capability without also weakening the security of every user of those devices and communications systems.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Vision of the Role for Machines in Security

Data Breach Today

RSA President Rohit Ghai on Humans and Machines Working Together as 'Trustworthy Twins' In a keynote address at the RSA Conference 2019, RSA President Rohit Ghai encouraged attendees to work in the coming years to "implement a security program with machines and humans working together. Humans asking questions; machines hunting answers.

Security 199

More Trending

article thumbnail

FBI's Wray on China's Counterintelligence Capabilities

Data Breach Today

At RSA Conference, Director Addresses Nation-State Threats Speaking at the RSA Conference 2019, FBI Director Christopher Wray noted that when he took on the job two years ago, he was "shocked" by China's growing counterintelligence capabilities.

177
177
article thumbnail

Hundreds of Docker Hosts compromised in cryptojacking campaigns

Security Affairs

Poorly protected Docker hosts exposed online continue to be a privileged target of crooks that abuse their computational resources in cryptojacking campaigns. Security experts have recently discovered hundreds of exposed Docker hosts that have been compromised by hackers exploiting the CVE-2019-5736 runc vulnerability in February. The flaw was discovered by the security researchers Adam Iwaniuk and Borys Pop?

Cloud 85
article thumbnail

Digital Transformation Needs Security Transformation, Too

Data Breach Today

CISO Scott Howitt of MGM Resorts Describes Adoption of New DevOps Methods As companies push more data to the cloud, large enterprises such as MGM Resorts International are balancing what it takes to complete their digital transformation journey and securing data that is rapidly moving off premises.

article thumbnail

Security Affairs - Untitled Article

Security Affairs

The Iran-linked Chafer APT group used a new Python-based backdoor in recent attacks aimed at a Turkish government entity. The Iran-linked Chafer APT group used a new Python-based backdoor in attacks carried out in November 2018 that targeted a Turkish government entity. The Chafer APT group has distributed data stealer malware since at least mid-2014, it was focused on surveillance operations and the tracking of individuals.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cybercriminals Target Young Gamers

Dark Reading

Deceptive and inappropriate tactics are prevalent in free gaming apps, according to a new report to be released at the RSA Conference.

95
article thumbnail

APT40 cyberespionage group supporting growth of China’s naval sector

Security Affairs

A cyber-espionage group, tracked as APT40, apparently linked to the Chinese government is focused on targeting countries important to the country’s Belt and Road Initiative. The cyber-espionage group tracked as APT40 (aka TEMP. Periscope , TEMP. Jumper , and Leviathan ), apparently linked to the Chinese government, is focused on targeting countries important to the country’s Belt and Road Initiative (i.e.

article thumbnail

Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage

Dark Reading

Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.

IT 79
article thumbnail

Google Chronicle announced Backstory to protect businesses

Security Affairs

Google Chronicle launched Backstory, the first global security telemetry platform designed to allow companies monitoring cyber threats. Google Chronicle announced Backstory, a cloud-based enterprise-level threat analytics platform that allows companies quickly investigate incidents, discover vulnerabilities and hunt for cyber threats. Google aims at analyzing network data and logs generated by enterprises on a daily basis and investigate potential malicious activities.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

States Need Way More Money to Fix Crumbling Voting Machines

WIRED Threat Level

“We are driving the same car in 2019 that we were driving in 2004, and the maintenance costs are mounting,” one South Carolina election official told researchers.

article thumbnail

Artificial Intelligence: The Terminator of Malware

Dark Reading

Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?

article thumbnail

OpenText Captiva Intelligent Capture continues to set the industry benchmark

OpenText Information Management

In the two years since OpenText™ acquired OpenText™ Captiva™ in 2017, the technology has continued to advance and become a strategic priority for companies and customers worldwide. According to Harvey Spencer Associates, the capture market is growing at over 10% annually, with the growth of the segment going hand-in-hand with the increase in digital transformation priorities … The post OpenText Captiva Intelligent Capture continues to set the industry benchmark appeared first on OpenText B

article thumbnail

Real-world space solutions: how one organization increased storage capacity by 30%

TAB OnRecord

Over the years, the team at TAB has seen many admirable feats of storage maximizing. You know the ones. Shelves from floor to ceiling. Staff squeezing themselves along narrow aisles. Spillover files kept in boxes that cover every available square inch of floor space, hall space, etc. Admirable, but far from ideal! With no option of expanding the storage space, many file room managers simply accept the overcrowded status quo.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Consumers Care About Privacy, but Not Enough to Act on It

Dark Reading

People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.

Privacy 84
article thumbnail

RSAC 2019: Picking Apart the Foreshadow Attack

Threatpost

Raoul Strackx, one of the researchers who discovered the Foreshadow speculative execution vulnerability, talks at RSA about the Catch-22 issue when it comes to fixing speculative execution flaws.

IT 59
article thumbnail

Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses

Dark Reading

Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.

79
article thumbnail

RSAC 2019: Most Consumers Say ‘No’ to Cumbersome Data Privacy Practices

Threatpost

Consumer confidence in companies keeping their data safe is at an all-time low, but password hygiene and not reading EULAs and app permissions remain big problems.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Organizations Taking Less Time to Detect Breaches

Dark Reading

But by the time they became aware, attackers have been on their networks for more than six months, new 2018 data shows.

72
article thumbnail

RSA Conference 2019: How to Be Better, on Trust, AI and IoT

Threatpost

Tuesday's keynotes kicking off RSA tackled both light and dark visions of the future, the imperative to become obsessed with trust, IoT and AI, and they even featured Helen Mirren and a flash mob.

IoT 54
article thumbnail

5 AI jobs that can make you a star now and in the future

DXC Technology

As enterprises gear up to launch or expand artificial intelligence (AI) initiatives, they are struggling with a severe and growing shortage of AI talent. This hardly is unique as emerging technologies begin to catch on and organizations seek people with the right skill sets and knowledge to leverage these new tools. For workers on the favorable […].

article thumbnail

Incident Response: Having a Plan Isn't Enough

Dark Reading

Data shows organizations neglect to review and update breach response plans as employees and processes change, putting data at risk.

Risk 64
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

NICE Robotic Automation Expands Partnership with ABBYY, Offering the Most Comprehensive End to End Digitization of Business Processes

Info Source

Hoboken, N.J., March 4 , 2019 – NICE (Nasdaq: NICE) today announced that its Robotic Process Automation (RPA) platform now incorporates additional Artificial Intelligence (AI) capabilities to rapidly streamline the processing of unstructured data contained in scanned documentation. As an expansion of its existing partnership with ABBYY, the integration of FlexiCapture Distributed delivers an innovative, end to end processing solution that uniquely and seamlessly integrates with NEVA (NICE Empl

article thumbnail

RSA Conference: BEC Scammer Gang Takes Aim at Boy Scouts, Other Nonprofts

Threatpost

A scammer ring dubbed Scarlet Widow has targeted nonprofits, schools and universities with an array of business email compromise (BEC) attacks over the past few months.

article thumbnail

6 Questions to Ask While Buying a Connected Car

Dark Reading

Here are six questions to keep in mind when you walk into the showroom to buy a networked car.

70