Fri.Dec 01, 2017

article thumbnail

Here's the NSA Agent Who Inexplicably Exposed Critical Secrets

WIRED Threat Level

The Justice Department has struck a plea deal with Nghia Hoang Pho, a programmer in the NSA's elite operations unit, for taking his highly classified work home with him.

Security 111
article thumbnail

Key Steps to GDPR Compliance – Part 1

IT Governance

There are only six months to go before the General Data Protection Regulation (GDPR) comes into effect, but some businesses are not even thinking about it yet, or are only just starting to. In the first of three blogs on GDPR compliance, we have set out the first steps for starting compliance projects along with some IT Governance solutions should you need any extra help. 1.

GDPR 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea's Latest Missile Test Was Even Scarier Than It Seemed

WIRED Threat Level

Further analysis of North Korea's latest ICBM launch shows that the country can likely land a nuclear weapon anywhere in the continental United States.

IT 109
article thumbnail

Different types of cyber attacks

IT Governance

A lot of organisations have experienced cyber attacks this year, but how were these companies actually hit? There are a number of different ways a criminal hacker can implement a cyber attack, and they all depend on what the criminal hacker is trying to gain. Some criminal hackers want data, whereas others want a ransom fee to be paid. The most common types of cyber attack are malware and vectors.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The US Should Modernize Election Systems to Prevent Hacking

WIRED Threat Level

Opinion: Two senators from opposing parties argue that voting machines should be considered critical infrastructure, and funded accordingly.

Security 101

More Trending

article thumbnail

Apple's MacOS High Sierra Update Reintroduces "Root" Bug For Some Users

WIRED Threat Level

The company's fix for an embarrassing security bug includes a big bug of its own.

Security 111
article thumbnail

Gimmal and KPMG Honored by American Diabetes Association Houston

Gimmal

Last night at Café Adobe in Houston, the American Diabetes Association Houston’s TourdeCure event planners held an appreciation dinner honoring top fundraisers, champions, red riders, and volunteers. Gimmal, along with our co-sponsors KPMG Houston , was recognized as a top fundraiser! This was a really great event and a first class bike ride for riders of any skill.

70
article thumbnail

Morrisons found liable for staff data leak in landmark decision

The Guardian Data Protection

Workers whose details were leaked by disgruntled employee may be able to claim compensation but supermarket will appeal Morrisons has been found liable for a former employee leaking personal information about nearly 100,000 members of staff in a landmark case which could prompt companies to limit workers’ access to data. The ruling opens the way to potential compensation for the workers, although the supermarket chain said it would appeal the judgment.

Access 65
article thumbnail

Don’t gift cyber attackers a free pass into your organisation this Christmas

IT Governance

Stock up on sprouts, hang the decorations and prepare for a barrage of cyber attacks, because the festive season is upon us. The past two Christmas periods have seen a spike in hacks, with cyber criminals taking advantage of employees who are either easing off at the end of the year or are away from the office. Retailers are the most affected , but lax security over Christmas is a problem for all organisations.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cloud Insecurity: Tens of Thousands of Full Credit Histories Exposed in Amazon S3 Bucket

eSecurity Planet

The data is unusually sensitive, including full credit card and bank account numbers as well as images of Social Security cards and driver's licenses.

Cloud 63
article thumbnail

Upcoming webinar: Creating an effective cyber security awareness programme

IT Governance

As hard as it is to believe, an organisation’s biggest security risk is often its own. 75% of large organisations suffered staff-related security breaches in , with 50% of the worst breaches caused by human error, according to a report published by Axelos. Yet when organisations initiate a compliance programme or implement an information security management system (ISMS), the importance of understanding the audience and their unique needs is often overlooked.

article thumbnail

Using data to drive a smarter way to faster insights

Information Management Resources

Deep integration between master data management and analytics execution can provide schema synchronization and offer new decision-making strategies.

article thumbnail

Document Management Systems: A Guide to the DMS, Its Features, and Its Advantages

Record Nations

Choosing the right document management system can be overwhelming. With so many different features selecting an option that will meet your current and future needs without being overly complex is a difficult task. This video will guide you through the different types of DMS systems and their strengths and weaknesses so you can make a […]. The post Document Management Systems: A Guide to the DMS, Its Features, and Its Advantages appeared first on Record Nations.

IT 47
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Holiday Card Fraud Forecast: What More Online Spend Means for CNP Fraud

Rippleshot

The early data on holiday spending — coupled with early holiday fraud projections — gives some insight into what issuers might expect as the year 2017 rounds down. To start, we’ve learned what most already knew: Consumers love to shop online. This year’s Black Friday/Cyber Monday figures confirmed that fact as consumers shelled out $5.03 billion online on Black Friday and Thanksgiving Day (a 16.8% increase from the year prior).

Sales 45
article thumbnail

'Blocking and Tackling' in the New Age of Security

Dark Reading

In a pep talk to CISOs, the chief security strategist at PSCU advises teams to prioritize resilience in addition to security.

article thumbnail

Doing Digital Right (A Book Review)

Information is Currency

Records management is a rapidly evolving field with the influx of digital content that records managers must steward. The challenge isn’t just managing electronic records, but non-records, content and other data as all information needs to be governed because all information provides risk because of many factors such as e-discovery, data breaches and so much more.

article thumbnail

Deception: Why It's Not Just Another Honeypot

Dark Reading

The technology has made huge strides in evolving from limited, static capabilities to adaptive, machine learning deception.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Flaw Found In Dirty COW Patch

Threatpost

Researchers have found a flaw in the original fix for the Dirty COW vulnerability patched in October 2016.

50
article thumbnail

Security Geek Gift Guide

Dark Reading

Fun gifts for cybersecurity co-workers and bosses alike.

article thumbnail

5 mistakes to avoid when deploying emerging technology

Information Management Resources

I would like to share these innovation facts that, from my experience, should be understood to avoid failing in this era where all of us are at the brink of launching 'The Next Big Thing.'.

article thumbnail

79 Percent of Companies Faced Severe Cyber Attacks in Q3 2017

eSecurity Planet

The quarter saw an average of 153 attacks per firm.

53
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

5 key ways to protect data being outsourced

Information Management Resources

Having established governance principles, especially when storing your information in a BPO, is vital should your company find itself on either side of an investigation.

article thumbnail

Sallie Mae CISO: 4 Technologies That Will Shape IT Security

Dark Reading

'The world as we know it will vanish,' according to Jerry Archer.

IT 45
article thumbnail

Another serious player is entering the governance 2.0 market

Information Management Resources

The new tool from erwin features Data Impact Analysis, to identify how changes in data will impact people, processes and systems.

article thumbnail

Celebrating the Bicentennial: Crafting the Old Ways

Unwritten Record

This is the second installment in our series about the United States Information Agency’s Young Film Maker Bicentennial Grant Films. In the previous post , we told you about the program and featured a trippy animated short. Today we have Sharon and Thomas Hudgins’ film Homespun and Stephen Rivkin’s Winter Count, both completed in 1975. Homespun. When the Young Film Maker Bicentennial grants were announced, Sharon Hudgins proposed a film about handweaving.

IT 22
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Rise of cryptocurrencies is putting them on central banks' radar

Information Management Resources

More than eight years since the birth of bitcoin, finance institutions around the world are increasingly recognizing the potential upsides and downsides of digital currencies.

article thumbnail

Joining the Digital Public Library of America

Archives Blogs

We here at FSU are happy to have been part of the team to make the launch of the Sunshine State Digital Network (SSDN) possible. The SSDN will coordinate the work of harvesting Florida digital collections into the Digital Public Library of America (DPLA). The first harvest of materials from Florida State University, Florida International University and the University of Miami is now available at dp.la.

article thumbnail

Google sued over privacy on behalf of 5M IPhone users

Information Management Resources

The plaintiff, a group called Google You Owe Us, said this is the first case of its kind in the U.K. against a major tech company over the alleged misuse of personal data.

Privacy 28