Mon.Jul 02, 2018

article thumbnail

6 Drivers of Mental and Emotional Stress in Infosec

Dark Reading

Pressure comes in many forms but often with the same impact: stress and burnout within the security community.

article thumbnail

Facebook to Congress: We Shared More Data Than We Said

Data Breach Today

Social Network Responds to Data Scandal Questions With 747 Pages of Answers Facebook has responded to more than 2,000 questions posed by U.S. Senate and House committees with 747 pages of answers, which reveal that Facebook was still been providing special access to user data to dozens of companies, six months after it says it had stopped doing so in 2015.

Access 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California's New Privacy Law: It's Almost GDPR in the US

Data Breach Today

But Tech Giants are Taking Aim at the Law, Which Can Be Amended Until 2020 California's legislature has quickly introduced and passed new privacy legislation, making the state's laws the strongest in the U.S. The new law gives consumers a raft of new rights, and aims to bring more transparency to the murky trade in people's personal information.

Privacy 218
article thumbnail

The Pentagon Is Building a Dream Team of Tech-Savvy Soldiers

WIRED Threat Level

For years the Army has tried to recruit talent from Silicon Valley. A new initiative aims to nurture the rising technologists within its own ranks, too.

IT 109
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Humana Notifying Victims of 'Identity Spoofing' Attack

Data Breach Today

Health Plan: Large Volume Log-In Attempts Coming From 'Foreign Countries' Humana is notifying individuals in multiple states that the company was a recent target of an "identity spoofing attack" that potentially compromised personal information of its members, including those participating in the health insurer's Go365 wellness programs.

Insurance 170

More Trending

article thumbnail

Scans Reveal 13 Million Internet-Exposed Databases

Data Breach Today

Rapid7's Tod Beardsley Says Many Inappropriate Protocols Remain Exposed Old technology never dies, but rather fades "very slowly" away, as evidenced by there being 21 million FTP servers still in use, says Rapid7's Tod Beardsley. Rapid7's scans of the internet have also revealed a worrying number of internet-exposed databases, memcached servers and poorly secured VoIP devices.

Security 140
article thumbnail

Request for Comments on Two Draft NARA Bulletins to Update Format Guidance

National Archives Records Express

We are making a few minor changes to NARA Bulletin 2014-04, Format Guidance for the Transfer of Permanent Records. These changes will streamline the process for future updates to the format tables. We are making these changes via a new NARA Bulletin, 2018-XX. We welcome your participation in the development of this guidance. We are requesting your comments on both bulletin drafts — NARA Bulletin 2018-XX and NARA Bulletin 2014-04.

65
article thumbnail

'Lazy' Hacking: Attack Automation Continues to Increase

Data Breach Today

But No Signs Hackers Yet Have AI, Says Cybereason's Ross Rustici Security experts warn that hackers could one day make use of machine learning and AI to make their attacks more effective. Thankfully, says Cybereason's Ross Rustici, that doesn't appear to have happened yet, although network-penetration attacks are getting more automated than ever.

Security 113
article thumbnail

Microsoft MVP Award, Year 8

Troy Hunt

Back in 2011, Microsoft gave me the rather awesome (IMHO) Most Valuable Professional Award for the first time. This is Microsoft's award for community leadership within a technology discipline which for me at the time, was developer security. I'm confident that award came largely due to the work I did on the OWASP Top 10 for.NET Developers series , a 10-part epic blog series that set me on the path to where I am today.

IT 60
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Traffic Analysis of the LTE Mobile Standard

Schneier on Security

Interesting research in using traffic analysis to learn things about encrypted traffic. It's hard to know how critical these vulnerabilities are. They're very hard to close without wasting a huge amount of bandwidth. The active attacks are more interesting.

article thumbnail

How FACTA Impacts Records Management

Record Nations

The Fair and Accurate Credit Transactions Act (FACTA) was enacted in 2003 to ensure the protection of consumers’ personal data. It provides consumers with the means to monitor their credit scores and dispute inaccuracies. FACTA guarantees that businesses are taking precautions to prevent identity theft. FACTA’s Impacts on Businesses A Plan Since FACTA has strict […].

article thumbnail

What has the catalog ever done for us?

IBM Big Data Hub

So what happens now when we go beyond the frontiers of the data warehouse and into the world of the data lake? – the world of Hadoop, of NoSQL, the world of schema on read, of discovering the data as is? For many organizations, the holy grail is to reap the benefits of the data lake while retaining a degree of control and governance. While it is desirable to have the broadest possible range of diverse data, the data on which the business runs must have the appropriate levels of provenance and li

article thumbnail

SAP solutions at OpenText Enterprise World 2018

OpenText Information Management

The event train continues on its track to the biggest of the them all – OpenText™ Enterprise World 2018. For us, its a particularly busy time having just wrapped up SAPPHIRE NOW® (If you missed the conference, I shared some highlights here) and with Enterprise World on the horizon. Many OpenText Product and Program Managers will be in … The post SAP solutions at OpenText Enterprise World 2018 appeared first on OpenText Blogs.

IT 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Preparing for Transport Layer Security 1.3

Dark Reading

The long-awaited encryption standard update is almost here. Get ready while you can to ensure security, interoperability, and performance.

article thumbnail

Is It Time for Your Employees to De-Dox Their Timelines?

Adam Levin

If you know anyone who maintains social media accounts and works in law enforcement, and they don’t use an alias, send them this article. Scratch that. If you know anyone who might be targeted by hackers who has too much real information “out there” (i.e., most people), send this article to them. It’s no secret that people with high-profile outward facing jobs have long used aliases–actors, media personalities, professional athletes, models, etc.

IT 40
article thumbnail

Azure IoT Edge Exits Preview with Security Updates

Dark Reading

Microsoft rolls out its cloud-based IoT service to the general public, while upping data protection with new categories including device management and security.

IoT 46
article thumbnail

The Modern Federal CIO: Making the most of new tools

CGI

The Modern Federal CIO: Making the most of new tools. premanath.puch…. Mon, 07/02/2018 - 04:52. Over the last several years, the role of the federal CIO has evolved. They have seen significant gains in their oversight and operational influence in IT delivery for mission support, with a set of expanded tools and authorities that have brought exciting new opportunities.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New hands-on lab at OpenText Enterprise World

OpenText Information Management

Enough with watching other people show you how OpenText™ technology works. Don’t you wish that you could try it out for yourself at your own pace? Without someone breathing down your neck? Studies show that learning is more effective when it’s an interactive experience. That’s why this year at OpenText Enterprise World 2018, we are … The post New hands-on lab at OpenText Enterprise World appeared first on OpenText Blogs.

article thumbnail

Blockchain: Should federal agencies use it?

CGI

Blockchain: Should federal agencies use it? premanath.puch…. Mon, 07/02/2018 - 05:59. The distributed ledger technology, blockchain, has been touted for its ability to potentially revolutionize business models. Since being used in 2009 as the underlying technology for the digital crypto-currency bitcoin, blockchain has been a buzzword on Wall Street and beyond.

article thumbnail

The benefits of site-to-site VPNs when moving to the cloud

OpenText Information Management

The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it remains a key method to enable secure remote access to corporate network resources. Security has become the prime concern for organizations as they increasingly adopt cloud computing. Implementing a site-to-site VPN solution delivers a highly … The post The benefits of site-to-site VPNs when moving to the cloud appeared first on OpenText Blogs.

Cloud 40
article thumbnail

How commercial best practices can aid federal agency process change

CGI

How commercial best practices can aid federal agency process change. premanath.puch…. Mon, 07/02/2018 - 06:17. Process change is at the heart of federal digital transformation, which means IT leaders must understand it and make it a top priority at their agencies. Business models can and should evolve as new technologies enable new capabilities, and that means changing the ways things are done.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Newsmaker Interview: Marten Mickos on the Future of Bug Bounty

Threatpost

Mickos sat down with Threatpost's Lindsey O'Donnell to talk about bug bounty program opportunities, challenges, and ultimately how programs are evolving. .

43
article thumbnail

Enabling stakeholders to boldly support data governance

Information Management Resources

By looking at how best to manage the people side of such programs, organizations can help to make the transitions more palatable and useful to those involved.

article thumbnail

ThreatList: Top Summer DDoS Trends

Threatpost

Distributed Denial of Service attacks maybe one of the oldest tools in a hacker’s toolbox, but that doesn’t mean they haven’t fallen out of fashion.

Cloud 44
article thumbnail

Majority of firms hit by ransomware attacks now paying up

Information Management Resources

At the same time, executives said their biggest concerns associated with cyber attacks are customer and brand reputation loss.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Welcome to a New Look for Threatpost

Threatpost

This update brings a fresh new look to the site, but also gives us a better platform overall, built and designed from the ground up for the future.

article thumbnail

'Clipboard Hijacker' Malware Builds on Cryptocurrency Threat

Dark Reading

Clipboard Hijackers are not a new threat, but this one shows attackers are getting more advanced.

45
article thumbnail

ThreatList: Exploit Kits Still a Top Web-based Threat

Threatpost

Here is a look at what exploit kits, CVEs and other web-based threats are keeping security professionals working overtime in 2018.