Fri.Apr 13, 2018

article thumbnail

Uber Faces Stricter FTC Oversight After Concealing Breach

Data Breach Today

Company Must Submit More Audit Reports, Keep Bug Bounty Records Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.

article thumbnail

Is your friend getting a cheaper Uber fare than you are? | Arwa Mahdawi

The Guardian Data Protection

We have no idea how much data tech firms have on us – but more companies are using it to personalize their prices We all know that ride-share companies like Uber and Lyft operate dynamic, or “surge”, pricing: they change their prices in real time, according to supply and demand. But is there something else behind these fluctuations in fees? Is your taxi fare actually being personalized according to how much the company thinks you are willing to pay?

IT 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Email Breach at Oxygen Equipment Maker Affects 30,000

Data Breach Today

Inogen Reports Security Incident in Filing with SEC Unauthorized access to an employee's email account has resulted in a breach affecting 30,000 current and former rental customers of Inogen, a maker and supplier of oxygen equipment, which notes that its insurance may not cover all related costs.

Insurance 124
article thumbnail

Northern Ireland Assembly suffered multiple targeted cyber attacks

IT Governance

Staff at the Northern Ireland Assembly were warned to update their passwords after its IT system suffered multiple targeted cyber attacks. According to the Belfast Telegraph and an Assembly spokesman, the Assembly’s IT system experienced a number of unauthorised attempts to access email accounts. The Assembly is now taking steps to mitigate future threats.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: Verizon's Breach Report 2018

Data Breach Today

Verizon's latest Data Breach Investigations Report shows that half of data breaches in 2017 worldwide were orchestrated by organized cybercriminal groups, says Verizon's Ashish Thapar, who offers an in-depth analysis of the findings.

More Trending

article thumbnail

RSA Conference Preview: More Video Interviews in 2018

Data Breach Today

Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders.

Security 100
article thumbnail

COPPA Compliance

Schneier on Security

Interesting research: " 'Won't Somebody Think of the Children?' Examining COPPA Compliance at Scale ": Abstract: We present a scalable dynamic analysis framework that allows for the automatic evaluation of the privacy behaviors of Android apps. We use our system to analyze mobile apps' compliance with the Children's Online Privacy Protection Act (COPPA), one of the few stringent privacy laws in the U.S.

article thumbnail

Moving to All IP? Beware of how it will paralyze vital communications

OpenText Information Management

It’s been talked about for a while by many providers, but the end is now most definitely in sight for many provider’s PSTN and ISDN connections. Large public carriers across the globe are beginning to ask permission of government to switch off their analog lines. Voice over IP (VoIP) now offers the same, and often … The post Moving to All IP?

article thumbnail

Cisco, ISARA to Test Hybrid Classic, Quantum-Safe Digital Certificates

Dark Reading

Goal is to make it easier for organizations to handle the migration to quantum computing when it becomes available.

IT 61
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A beginners guide to establishing a successful testing and optimization program

OpenText Information Management

If you are reading this, chances are you are the lucky individual that’s been chosen to own and champion testing and optimization within your organization. Congratulations, you are about to embark on one of the most exciting journeys of your career. You’ve been given the unique opportunity to have a direct impact on the business’ … The post A beginners guide to establishing a successful testing and optimization program appeared first on OpenText Blogs.

article thumbnail

Credit Card Fraud Schemes in the News

Rippleshot

There’s never quite a dull moment in the world of credit card fraud, which was the case this week in the mainstream news cycle. With topics like “chip card scheme,” “fake fraud alerts” and “card shimming scam” in the headlines, it’s easy to see why banks are rushing to implement better, faster fraud detection solutions. That was just a sliver of what made the headlines in the world of payment card fraud news this week.

40
article thumbnail

Federal Agency Data Under Siege

Dark Reading

Seventy-one percent of IT security professionals in US federal agencies have reported breaches in their organizations.

article thumbnail

These skills and experiences will best boost a data science career

Information Management Resources

Members of the Society for Information Management offer their advice on the top qualities and knowledge that data scientists should have to advance in the field.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Steps to a Smooth, Secure Cloud Transition

Dark Reading

Security leaders share their top steps to keep in mind as your organization moves data and applications to the cloud.

Cloud 47
article thumbnail

How to turn a doomed data project into a digital delight

Information Management Resources

Here are steps that will ensure your effort delivers real value and that your users won’t turn around when it’s complete and tell you they wanted something else.

Mining 35
article thumbnail

Power Line Vulnerability Closes Air Gap

Dark Reading

A new demonstration of malware shows that air-gapped computers may still be at risk.

Risk 49
article thumbnail

Zuckerberg's Congressional testimony proves we need a Data Bill of Rights

Information Management Resources

It should have two components: One to specify how much control we have over how our information is used, and the other to enforced how algorithms are monitored more generally.

IT 32
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Former Airline Database Administrator Sentenced for Hacking Reservation System

Dark Reading

Former PenAir IT staffer gets five-year probation sentence via plea deal.

IT 45
article thumbnail

Zuckerberg asked to explain himself in European Parliament

Information Management Resources

Regulators in Europe called revelations that Cambridge Analytica had obtained swathes of data from a researcher a 'game changer' in the world of privacy protection.

Privacy 32
article thumbnail

Friday Squid Blogging: Eating Firefly Squid

Schneier on Security

In Tokama, Japan, you can watch the firefly squid catch and eat them in various ways : "It's great to eat hotaruika around when the seasons change, which is when people tend to get sick," said Ryoji Tanaka, an executive at the Toyama prefectural federation of fishing cooperatives. "In addition to popular cooking methods, such as boiling them in salted water, you can also add them to pasta or pizza.

IT 48
article thumbnail

Cloud adoptions are surging, and so are related data threats

Information Management Resources

Reversing a multi-year downward trend, nine out of 10 security professionals said they’re concerned about cloud security according to a new study.

Cloud 34
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Gertrude Hall Brownell Collection of Viola Roseboro’ Correspondence

Archives Blogs

I recently processed a single box collection of correspondence from Viola Roseboro’, a fiction editor and author at the turn of the 20th century, to her friend Gertrude Hall Brownell, poet and author. The correspondence spans an eight year period (1936-1944) toward the end of Roseboro’s life. This small collection contains primarily one-sided correspondence from Viola Roseboro’ to Gertrude Hall Brownell, with the occasional enclosed letter by Gertrude Hall Brownell or other co

article thumbnail

Organizations await ‘inevitable’ data privacy rules, but which ones?

Information Management Resources

One of the biggest takeaways of Facebook CEO Mark Zuckerberg’s two days of testimony before Congress is that some form of new legislation is now a 'given.'.

article thumbnail

Weekly Update 82 (Honolulu Edition)

Troy Hunt

I'm in Honolulu! And I apologise in advance for the audio quality - the background noise is air conditioning units in the hotel and I didn't realise quite how much sound they make until I listened to the audio afterwards. Next week I'll be home and back to a quality audio setup. Regardless, I did pump out a shorter update with a bunch of bits and pieces that popped up during the week.

article thumbnail

8 ways BI projects are different from IT initiatives

Information Management Resources

Healthcare organizations must recognize the difference and avoid adopting a one-size-fits-all methodology.

IT 34
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Ex-Goldman trader teams up with millennials to make AI dark pool

Information Management Resources

OneChronos is seeking to be the first venue trading mainstream securities firm to use artificial intelligence to match trades.