Fri.Mar 22, 2019

article thumbnail

GDPR: Data Breach Notification 101

Data Breach Today

Brian Honan of BH Consulting on When to Notify - or Not Since the EU's new GDPR privacy law came into effect in May 2018, one challenge for organizations that suffer a breach is knowing whether or not they must report it to authorities, says Brian Honan, president and CEO of BH Consulting in Dublin.

GDPR 235
article thumbnail

BEST PRACTICES: How to protect yourself from the enduring scourge of malvertising

The Last Watchdog

Malvertising is rearing its ugly head – yet again. Malicious online ads have surged and retreated in cycles since the earliest days of the Internet. Remember when infectious banner ads and viral toolbars cluttered early browsers? Related: Web application exposures redouble. Historically, with each iteration of malicious ads, the online advertising industry, led by Google, has fought back, and kept this scourge at a publicly acceptable level.

Retail 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU Seeks Better Coordination to Battle Next Big Cyberattack

Data Breach Today

Life After WannaCry and NotPetya: Europol Wants EU Member States To Be Ready Life after WannaCry and NotPetya: Europol, the EU's law enforcement intelligence agency, wants member states to be able to rapidly respond to the next big cyberattack against Europe. But with warnings of ongoing Russian election interference campaigns, the next big attack may already be underway.

224
224
article thumbnail

FEMA Leaked Data From 2.3 Million Disaster Survivors

WIRED Threat Level

The Homeland Security Department inspector general released a damning report about FEMA's inability to safeguard the personal info of the people it helped.

Security 106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Future of Cybersecurity Education - Part 1

Data Breach Today

ISACA and (ISC)2 on Meeting Changing Demands of Industry, Students What is the role of professional certification companies in the cybersecurity education ecosystem? In part one of a two-part panel discussion on the future of cybersecurity education, John McCumber of (ISC)2 and Rob Clyde of ISACA share their philosophies.

Education 197

More Trending

article thumbnail

Norsk Hydro's Ransomware Headache

Data Breach Today

The latest edition of the ISMG Security Report discusses the recent ransomware attack on aluminum giant, Norsk Hydro. Plus, confessions of a former LulzSec and Anonymous hacktivist, and the growing problem of cyber extortion.

article thumbnail

Russian APT groups target European governments ahead of May Elections

Security Affairs

Russian APT groups are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections. According to experts from FireEye, Russia-linked APT28 (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) and Sandworm Team (also TeleBots ) cyberespionage groups are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections.

article thumbnail

Microsoft Brings Defender ATP Platform to macOS

Data Breach Today

Security Vendor Reports 'Tens of Thousands' of Mac Malware Detections Monthly A decade or more ago, this would have been unthinkable: Microsoft developing an anti-malware platform for macOS. But Windows Defender ATP is now available for Macs via a limited preview. Microsoft says the move will help protect customers running non-Windows machines.

Security 179
article thumbnail

Medtronic’s implantable heart defibrillators vulnerable to hack

Security Affairs

The U.S. Department of Homeland Security Thursday issued a security advisory for multiple vulnerabilities affecting over a dozen heart defibrillators. Multiple vulnerabilities in the heart defibrillators could be exploited by attackers to remotely control the devices, potentially putting the lives of patients at risk. An implantable cardioverter-defibrillator (ICD) is a device implantable inside the human body that performs cardioversion, defibrillation, and pacing of the heart. .

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cyber Risk Management: Why Automation is Essential

Data Breach Today

Skybox Security's Michelle Cobb on Point Solutions Versus Platforms The challenge of wanted to adopt the latest and greatest point products, as opposed to opting for a more platform-based approach, seems never-ending, and can only be managed by bringing greater amounts of automation to bear, says Skybox Security's Michelle Cobb.

Risk 171
article thumbnail

What you need to know about the DPA 2018 and the GDPR

IT Governance

The data protection landscape was dramatically reshaped with the introduction of the EU GDPR (General Data Protection Regulation) on 25 May 2018, but it wasn’t the only law that took effect that day. The UK DPA (Data Protection Act) 2018 also came into force, and although it arrived with much less fanfare than the EU GDPR, it’s just as important. In this blog, we explain why the DPA 2018 exists, what it contains and how it relates to the EU GDPR.

GDPR 88
article thumbnail

Washington, D.C. AG Wants Better Data Breach Protection

Data Breach Today

Top District Prosecutor Aims to Improve Consumer Breach Protection Karl Racine, the attorney general for Washington, D.C., is looking to strengthen the District's data breach laws, specifically by offering greater protection for consumers and holding businesses accountable when they are breached or lose data.

article thumbnail

Pwn2Own 2019 Day 2 – Hackers earned $270,000 for Firefox, Edge hacks

Security Affairs

On the second day of the Pwn2Own 2019 hacking competition, white hat hackers earned a total of $270,000 for exploits against the Mozilla Firefox and Microsoft Edge web browsers. Day 2 at Pwn2Own 2019 hacking competition – White hat hackers earned $270,000 for exploits against the Mozilla Firefox and Microsoft Edge browsers. The security duo Amat Cama and Richard Zhu of team Fluoroacetate earned $50,000 for a Firefox exploit with kernel escalation.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Future of Cybersecurity Education - Part 2

Data Breach Today

Intel's Amit Elazari Bar On and UC-Berkeley's Lisa Ho on Schools and Digital Transformation What are America's universities doing to help fill the cybersecurity skills gap felt by enterprises worldwide? In part two of a two-part panel discussion on the future of cybersecurity education, Lisa Ho of the University of California-Berkeley and Amit Elazari Bar On of Intel Corp. offer insights.

Education 160
article thumbnail

The Mueller Report Is Done. Now Comes the Hard Part

WIRED Threat Level

Special counsel Robert Mueller finished his investigation into the 2016 presidential election Friday.

Security 109
article thumbnail

Warnings Issued About Medtronic Cardiac Devices

Data Breach Today

Wireless Communication Weakness Could Allow Attackers to Manipulate Products Federal regulators and medical device maker Medtronic have issued new warnings about cybersecurity vulnerabilities in certain cardiac devices from the manufacturer that could potentially allow attackers to manipulate the products' functionality, posing safety risks to patients.

article thumbnail

Simplifying cybersecurity for the water sector – a reminder on World Water Day

Thales Cloud Protection & Licensing

World Water Day is a UN initiative celebrated every March 22. It honors water and focuses on those deprived of it. The occasion is a persuasive aide-memoire to the human world to deal with the global water crisis. Population growth has increased the demand for water, and water management organizations are driven to conserve and manage this essential resource.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security Lessons from My Game Closet

Dark Reading

In an era of popular video games like Fortnite and Minecraft, there is a lot to be learned about risk, luck, and strategy from some old-fashioned board games.

article thumbnail

Cisco addresses High-Severity flaws in IP Phone 8800 and 7800 series

Security Affairs

Cisco released security updates to address vulnerabilities in its IP Phone 7800 and 8800 series that could be exploited by remote, unauthenticated attackers. Cisco released security patches to address vulnerabilities in its IP Phone 7800 and 8800 series that could be exploited by remote, unauthenticated attackers. Cisco IP Phone 8800 series are business desk phones that supports HD video, while Cisco IP Phone 7800 series are designed for desktops and conference rooms in businesses. .

article thumbnail

Utah Just Became a Leader in Digital Privacy

WIRED Threat Level

Opinion: Utah legislators recently voted to pass landmark legislation in support of a new privacy law. Statehouses across the country should take notes.

Privacy 82
article thumbnail

Protecting sensitive information can’t be left to chance

OpenText Information Management

Confidentiality and data privacy have always been concerns for businesses, particularly in industries like legal, healthcare, financial, and insurance. But with new international regulations and privacy acts, the ability to protect and redact sensitive information is becoming increasingly critical to companies across all industries. While manual redaction is a useful tool, guaranteeing the protection of … The post Protecting sensitive information can’t be left to chance appeared firs

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Inside Incident Response: 6 Key Tips to Keep in Mind

Dark Reading

Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.

81
article thumbnail

Advocate General Finds Cookie Consent Must Be Active and Separate

Hunton Privacy

On March 21, 2019, Advocate General Maciej Szpunar (“Advocate General”) of the Court of Justice of the European Union (“CJEU”) issued an Opinion in the Case C-673/17 of Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverbände – Verbraucherzentrale Bundesverband e.V. ( i.e. , the Federation of German Consumer Organizations, the “ Bundesverband ”), which is currently pending before the CJEU.

GDPR 65
article thumbnail

Analysis: Drone Tech Creates New Type of Blended Threat

Threatpost

Hacked drones are breaching physical and cyberdefenses to cause disruption and steal data, experts warn.

Privacy 83
article thumbnail

US disaster agency mishandled data of 2.3m hurricane and wildfire survivors

The Guardian Data Protection

Report finds Fema unnecessarily shared personal data, including bank details, with outside contractor The US disaster relief agency unnecessarily released sensitive identifiable data, including banking information, of 2.3m disaster survivors to an outside contractor, according to a report by theOffice of Inspector General. The survivors, who were affected by hurricanes Harvey , Irma , and Maria , as well as the 2017 wildfires in California , had provided their information to the Federal Emergenc

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Medtronic Defibrillators Have Critical Flaws, Warns DHS

Threatpost

The unpatched vulnerabilities exist in 20 products made by the popular Medtronics medical device manufacturer, including defibrillators and home patient monitoring systems.

article thumbnail

Two Found Guilty in Online Dating, BEC Scheme

Dark Reading

Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts.

69
article thumbnail

UK ICO Fines Vote Leave £40,000 for Unsolicited Texts

Hunton Privacy

The UK’s Information Commissioner’s Office (“ICO”) has fined Vote Leave Limited (the UK’s official Brexit campaign) £40,000 for sending almost 200,000 unsolicited texts promoting the aims of the campaign. In an unrelated action, the ICO has carried out searches of a business believed to have been responsible for initiating nuisance telephone calls. The ICO has highlighted nuisance calls, spam texts and unsolicited direct marketing as areas of “significant public concern,” and is increasingly imp