Thu.Mar 07, 2019

article thumbnail

GRC: A Status Report

Data Breach Today

Matt Kunkel of LogicGate Offers Update on Governance, Risk Management and Compliance How are governance, risk management and compliance changing as a result of evolving privacy regulations? Matt Kunkel of LogicGate offers an update.

article thumbnail

[Podcast] Laying the Foundation for Digital Transformation with PDF

AIIM

Ask any builder and they’ll probably tell you that the strength of a building lies in its foundation. It’s the portion of the building upon which the entire structure sits – meaning without a solid foundation, a building or home won’t stand the test of time and can actually be dangerous to its occupants. If you were to think of building your business’ digital transformation in a similar manner to constructing a building, you’ll need a solid foundation to build out all of your process improvement

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR: Still Plenty of Lessons to Learn

Data Breach Today

RSA Conference Panel: Organizations Worldwide Face Long List of Challenges Nearly 10 months after the beginning of enforcement of the EU's GDPR privacy regulation, organizations around the world are still learning plenty of compliance lessons - including how to locate all personal data so it can be protected, according to regulatory experts on a panel at RSA Conference 2019.

GDPR 186
article thumbnail

The Netherlands – S.A. states that websites must be accessible at all times; cookie wall not allowed

DLA Piper Privacy Matters

On 7 March 2019, the Dutch Supervisory Authority (“S.A.”) created quite some buzz in the online Dutch (advertising) industry: websites that only give visitors access to their site if they agree to tracking cookies (or similar technologies) do not comply with the GDPR. This also means that the so-called cookie walls that are placed on websites, preventing visitors access to websites if they do not consent to tracking cookies, are not allowed in the view of the Dutch S.A.

Access 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Beyond 'Black Box' MSSP Security: How to Get the Most

Data Breach Today

Matt Peters of Expel Describes Hybrid Approaches to Security Operations For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel.

Security 151

More Trending

article thumbnail

RSA Conference 2019: Ultrasound Hacked in Two Clicks

Threatpost

In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware.

article thumbnail

Research confirms rampant sale of SSL/TLS certificates on darkweb

Security Affairs

A study conducted by academics discovered that SSL and TLS certificates and associated services can be easily acquired from dark web marketplaces. A study sponsored by Venafi and conducted by researchers from Georgia State University in the U.S. and the University of Surrey in the U.K. discovered that SSL and TLS certificates and associated services can be easily acquired from dark web marketplaces.

Sales 87
article thumbnail

An Email Marketing Company Left 809 Million Records Exposed Online

WIRED Threat Level

A exposed database belonging to Verifications.io contained both personal and business information, including 763 million unique email addresses.

article thumbnail

StealthWorker Malware Uses Windows, Linux Bots to Hack Websites

Security Affairs

Security experts at FortiGuard uncovered a new malware campaign aimed at delivering the StealthWorker brute-force malware. The malicious code targets both Windows and Linux systems, compromised systems are used to carry out brute force attacks along with other infected systems. The malicious code was first discovered by Malwarebytes at the end of February and tracked by malware researchers at Cybaze -Yoroi ZLab as GoBrut.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

International Women’s Day: Supporting gender diversity in cybersecurity, putting the skills gap into the history books

Thales Cloud Protection & Licensing

Last year was the first time companies in Great Britain had to disclose their gender pay gap figures. Whilst efforts have been made to reduce this gap and make a positive step forward in gender equality, four in ten private companies are reporting a wider gender pay gap in 2019 than they did last year. The cybersecurity industry in particular – which is already tackling a major skills deficit – is one of the industries hardest hit by a lack of diversity.

article thumbnail

8 ways blockchain will change finance & accounting

DXC Technology

Blockchain is rapidly evolving from hype to high-value technology with real-world applications in business. In 2017, blockchain began making its way onto the roadmap of business process services. Now it is emerging in full operational deployments and disrupting fundamental business processes related to buying and selling and converging into mainstream accounting technology used to record […].

article thumbnail

Cisco security updates fix dozens of flaws in Nexus Switches

Security Affairs

Cisco released security updates to address over two dozen serious vulnerabilities affecting the Cisco Nexus switches. Cisco released security updates to address over two dozen serious vulnerabilities affecting the Cisco Nexus switches, including denial-of-service (DoS) issues, arbitrary code execution and privilege escalation flaws. Cisco published security advisories for most of the vulnerabilities, many of them impact the NX-OS software running on the Nexus switches and on other Cisco devices

article thumbnail

Twitter, Facebook, NSA Discuss Fight Against Misinformation

Dark Reading

RSA panelists address the delicate technical challenges of combating information warfare online without causing First Amendment freedoms to take collateral damage.

77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft warns of economic damages caused by Iran-linked hackers

Security Affairs

Researchers at Microsoft warn of damages caused by cyber operations conducted by Iran-linked cyberespionage groups. Security experts at Microsoft are warning of economic damages caused by the activity of Iran-linked hacking groups that are working to penetrate systems, businesses, and governments worldwide. According to Microsoft, the attackers already caused hundreds of millions of dollars in damages by stealing secret data and wiping information from computer networks of 200 companies over the

article thumbnail

Raytheon IIS Seizes the Moment with Cybersecurity as a Service

Dark Reading

Tapping the flexibility and reach of the cloud makes good sense for customers, according to Jon Check, senior director, cyber protection solutions for Raytheon Intelligence, Information and Services. Cybersecurity as a Service (CYaaS) ensures both data resilience and cyber resilience by integrating analytics and automation features into the mix.

article thumbnail

Weekly podcast: Reports galore! DCMS, Microsoft and Cisco

IT Governance

This week, we delve into the government’s FTSE 350 Cyber Governance Health Check report, Microsoft’s Security Intelligence Report Volume 24, and Cisco’s latest Data Privacy Benchmark Study. Hello and welcome to the IT Governance podcast for Thursday, 7 March 2019. After – we think – 160 episodes and approaching 200,000 listens, I have to announce that our days are numbered.

GDPR 70
article thumbnail

Companies Having Trouble Translating Security to Mobile Devices

Dark Reading

As more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet, according to a new Verizon report.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Detecting Shoplifting Behavior

Schneier on Security

This system claims to detect suspicious behavior that indicates shoplifting: Vaak , a Japanese startup, has developed artificial intelligence software that hunts for potential shoplifters, using footage from security cameras for fidgeting, restlessness and other potentially suspicious body language. The article has no detail or analysis, so we don't know how well it works.

article thumbnail

OpenText at RSA: EnCase wins top forensic award from SC Magazine

OpenText Information Management

On March 5 at RSA 2019, SC Magazine named OpenText™ EnCase™ Endpoint Investigator, OpenText™ EnCase™ Forensic, and OpenText™ EnCase™ Mobile Investigator as the Best Computer Forensic Solutions for the ninth consecutive year. From the EnCase Team, thank you to SC Media for recognizing OpenText and EnCase as a leader in digital forensic investigations once again. … The post OpenText at RSA: EnCase wins top forensic award from SC Magazine appeared first on OpenText Blogs.

article thumbnail

RSA Conference 2019: Firms Continue to Fail at IoT Security

Threatpost

IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019.

IoT 74
article thumbnail

Regular User Awareness Training Still the Best Security Tactic

Dark Reading

Email continues to be the largest area of exposure for most organizations, and phishing emails lead the charge, according to Stu Sjouwerman, founder and CEO of KnowBe4. And while AI and machine learning can make a difference, these same tools are used by the bad guys, Sjouwerman adds. Regular, monthly trainings help reduce phishing click rates.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Auto-Classifying data with Magellan: What approaches are there?

OpenText Information Management

In the first installment of this series, we considered the reasons why you might want to turn to auto-classification to help manage your data. This time around, we want to have a closer look at the Machine Learning (ML) approaches available and the OpenText™ solutions that integrate them. Today, ML algorithms are embedded in more … The post Auto-Classifying data with Magellan: What approaches are there?

article thumbnail

How China & Russia Use Social Media to Sway the West

Dark Reading

Researchers break down the differences in how China and Russia use social media to manipulate American audiences.

84
article thumbnail

Continuous availability of data drives continuous intelligence

IBM Big Data Hub

Bring our unified POV on Data Replication and its impact on driving analytics initiatives to counter Qlik buying Attunity. .

article thumbnail

Phishing Attacks Evolve as Detection & Response Capabilities Improve

Dark Reading

Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Machine Learning Can Use Tweets To Automatically Spot Critical Security Flaws

WIRED Threat Level

Researchers built an AI engine that uses tweets to predict the severity of software vulnerabilities with 86 percent accuracy.

article thumbnail

4 Ways At-Work Apps Are Vulnerable to Attack

Dark Reading

Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.

article thumbnail

9 Questions for Facebook After Zuckerberg’s Privacy Manifesto

WIRED Threat Level

On Wednesday, Mark Zuckerberg laid out a vision for a very different Facebook—with a lot of unknowns about how to get there.

Privacy 71