Mon.Jul 22, 2019

article thumbnail

Equifax Negotiates Potential $700 Million Breach Settlement

Data Breach Today

Deal Prepped With Feds and State Attorneys General Includes Victim Compensation Credit reporting giant Equifax has negotiated a proposed settlement that could reach $700 million to resolve federal and state probes into its massive 2017 data breach, as well as a nationwide class action lawsuit. The company's total post-breach tab is likely to exceed $2 billion.

article thumbnail

AIIM Virtual Event Explores Real-World IIM Success Stories

AIIM

Wouldn’t it be nice to hear first-hand, from one of your peers, about the Intelligent Information Management technologies and tools that they have applied in the real world to accomplish a specific digital transformation goal? That’s what we’ll be discussing when I host AIIM’s next virtual event on Thursday, July 25th, from 1pm-3pm. Join us for this live online video session as thought leaders in a variety of industries share their success stories and how they’ve made a difference.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recent DNS Hijacking Campaigns Trigger Government Action

Data Breach Today

US and UK Agencies Respond to Increasing Attacks A recent spate of attacks targeting domain name system protocols and registrars, including several incidents that researchers believe have ties to nation-state espionage, is prompting the U.S. and U.K. governments to issues warnings and policy updates to improve security.

article thumbnail

Just 10 commands, then keep learning

Jamf

Scripting helps Jamf admins to get the most out of Jamf, but it can be intimidating at first. For those of you thinking “scripting terrifies me,” this blog post is for you.

IT 89
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Audit Finds More Security Vulnerabilities at IRS

Data Breach Today

GAO Makes More Security Recommendations; IRS Now Has 127 Issues to Resolve The Internal Revenue Services' internal financial reporting systems and IT infrastructure have 14 new security vulnerabilities, along with a long list of previously unresolved deficiencies, according to a U.S. Government Accountability Office audit.

Security 164

More Trending

article thumbnail

Ex-NSA Contractor Harold Martin Hit With 9-Year Sentence

Data Breach Today

Pleaded Guilty to Stealing Files From NSA, CIA, US Cyber Command Former government contractor Harold Thomas Martin III has been sentenced to serve nine years in federal prison after he pleaded guilty to stealing and retaining classified and secret files and data from U.S. government agencies, including the National Security Agency and CIA.

article thumbnail

6 Actions that Made GDPR Real in 2019

Dark Reading

In the wake of recent fines levied against British Airways, Marriott, and Facebook, companies are starting to take data privacy and security more seriously.

GDPR 87
article thumbnail

2.3 Billion Files Exposed Online: The Root Causes

Data Breach Today

Misconfigured file storage technologies and a lack of basic security controls are the root causes for the inadvertent online exposure of 2.3 billion files worldwide that contain personal information, including sensitive medical data, says Harrison Van Riper, a security researcher at Digital Shadows.

Security 127
article thumbnail

Equifax to Pay Up to $700mn for Data Breach Damages

Dark Reading

In a settlement with the FTC, consumers affected by the breach are eligible for up to $20,000 in a cash settlement, depending on damages they can prove.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ireland Assessing Minors' Profiles on Instagram

Data Breach Today

Data Scientist Files Reports With European Regulators Ireland's Data Protection Commission says it is "assessing" a report concerning minors who have business profiles on Instagram that may expose email addresses and phone numbers. As many as 5 million kids worldwide have business accounts, but often they have no discernible link to a real business.

IT 127
article thumbnail

Kazakhstan wants to intercept all HTTPS Internet traffic of its citizens

Security Affairs

Bad news for citizens of Kazakhstan, the government is beginning to intercept all the encrypted traffic, and to do it, it is forcing them to install a certificate. The Kazakhstan government is beginning to intercept all the encrypted traffic and to do it is forcing users in the country to install a certificate. The Kazakhstan authorities issued an advisory to local Internet Service Providers (ISPs) asking them to allow their customers to access the Internet only after the installation on their d

IT 81
article thumbnail

How Cybercriminals Break into the Microsoft Cloud

Dark Reading

Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.

Cloud 92
article thumbnail

Czech public radio says Huawei Czech Unit secretly collected data

Security Affairs

New problems for Huawei, t he Czech unit of telecoms giant secretly collected personal data customers, officials and business partners. Huawei made the headlines again, according to the Czech public radio the Czech unit of Chinese telecoms giant secretly collected personal data of customers, officials, and business partners. The radio cited two former Huawei managers as the source, the duo speaking on condition of anonymity revealed that Huawei required them to enter the data into computer syste

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Re-energize your Enterprise @ #DevDay Toronto and NYC

Micro Focus

What does the word ‘re-energize’ mean to you? A spa vacation would be a great way for me to get my mojo back. Modernizing core business applications does the same job for enterprise IT; a renewal process that gives what you have a fresh sense of purpose. Less fun than a vacation, sure, but just. View Article.

IT 74
article thumbnail

CERT-Bund warns of a critical vulnerability in VLC player

Security Affairs

VLC player is still affected by a critical heap-based memory buffer over-read condition, tracked as CVE-2019-13615 , that could be exploited by a remote attacker to execute arbitrary code. The VLC player is still affected by a critical remote code execution vulnerability tracked as CVE-2019-13615. The potential impact of the flaw is important because the software has more than 3.1 billion installs across various operating systems and versions.

article thumbnail

OpenText automates invoicing for Rosneft Deutschland

OpenText Information Management

OpenText™ recently announced that Rosneft Deutschland GmbH, Germany’s third largest crude oil refiner and a major wholesaler of petroleum products, has deployed OpenText Business Network solutions to help accelerate invoicing automation. OpenText B2B Managed Services and OpenText Active Invoices with Compliance enable Rosneft Deutschland to more quickly onboard and deliver electronic invoices to customers in multiple … The post OpenText automates invoicing for Rosneft Deutschland appeared

B2B 74
article thumbnail

Hackers published a list of allegedly phished Discord login credentials

Security Affairs

Last week, hackers published a list of Discord credentials (email addresses/passwords) that were allegedly phished from the users of the gaming chat platform. Last week, a group of hackers published a list of Discord login credentials (email addresses and passwords) that were allegedly phished from the users of the gaming chat platform. Fortunately, the list is composed only of around 2,500 entries. “This was no virus, worm or malware of any sort—it was simple old phishing site that utiliz

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Clouds and containers are not all about what’s new and hot

DXC Technology

This past Spring at London’s OpenInfra Days UK 2019, Mark Shuttleworth, executive chairman at Canonical and creator of Ubuntu Linux, said in a keynote, “I believe OpenStack is important. It’s become trendy to say: ‘I’m skipping OpenStack and going straight to Kubernetes.’ It’s like skipping salad and going straight to steam – they both solve […].

Cloud 73
article thumbnail

BlackBerry Cylance addresses AI-based antivirus engine bypass

Security Affairs

BlackBerry Cylance has addressed a bypass vulnerability recently discovered in its AI-based antivirus engine CylancePROTECT product. Experts at cybersecurity firm Skylight announced last week that they have devised a method to bypass BlackBerry Cylance’s AI-based antivirus engine, now the company addressed the issue with an update and attempted to downplay the impact of the issue.

Cloud 75
article thumbnail

CISO Pressures: Why the Role Stinks and How to Fix It

Dark Reading

CISOs spend much less time in their role than other members of the boardroom. It's a serious problem that must be addressed.

IT 89
article thumbnail

WSJ says Equifax to Pay $700 million settlement for 2017 breach

Security Affairs

The Wall Street Journal revealed that Equifax will pay around $700 million to settle with the Federal Trade Commission over the 2017 data breach. According to The Wall Street Journal, Equifax will pay around $700 million to settle with the Federal Trade Commission over the 2017 data breach. The security breach suffered by Equifax in 2017 exposed private information of nearly 150 million individuals.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Planning a Bug Bounty Program? Follow Shopify's Example

Dark Reading

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.

74
article thumbnail

The Marines’ New LMADIS Drone-Killer Aced Its First Test

WIRED Threat Level

Last week’s US strike of an Iranian drone is the first reported successful use of LMADIS, the Marines’ new energy weapon.

IT 86
article thumbnail

Critical RCE Flaw in Palo Alto Gateways Hits Uber

Threatpost

The bug is previously unknown but yet still fixed in later releases. However, many organizations are likely still vulnerable.

Cloud 83
article thumbnail

$700 Million Equifax Fine Is Still Too Little, Too Late

WIRED Threat Level

For failing to safeguard Social Security numbers, credit card numbers, and more, Equifax will pay up—but not enough, experts say.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Amazon Alexa, Google Home On Collision Course With Regulation

Threatpost

Threatpost talks to Tim Mackey with Synopsys about recent Amazon Echo and Google Home privacy faux pas. Will GDPR and other regulations catch up to the voice assistants?

GDPR 70
article thumbnail

Human-centered design is key to succeeding in Industry 4.0

CGI

Human-centered design is key to succeeding in Industry 4.0. pooja.cs@cgi.com. Mon, 07/22/2019 - 05:19. Manufacturers are in the midst of a revolution?a fundamental shift in the way they think about operating, competing and delivering value. The days of chasing kaizen improvements?small continuous and incremental changes to stable and established processes?

article thumbnail

Security Affairs - Untitled Article

Security Affairs

Security experts have discovered a critical remote code execution flaw in Palo Alto Networks GlobalProtect product, the flaw was quickly addressed. Last week, researchers Orange Tsai and Meh Chang published technical details of a critical remote code execution vulnerability that affects Palo Alto Networks’s GlobalProtect. The vulnerability, tracked as CVE-2019-1579, affects the GlobalProtect portal and GlobalProtect Gateway interface products.

Access 64