Tue.Jan 08, 2019

Dirt-Cheap, Legit, Windows Software: Pick Two

Krebs on Security

Buying heavily discounted, popular software from second-hand sources online has always been something of an iffy security proposition.

Feds Urge Private Sector 'Shields Up' Against Hackers

Data Breach Today

Trump Administration Warns of Economic Espionage Risk From China, Russia, Iran The Trump administration has launched a public awareness campaign, spearheaded by the National Counterintelligence and Security Center, urging the U.S.

Risk 249

No, Spotify Wasn't Hacked

Troy Hunt

Encryption: Avoiding the Pitfalls That Can Lead to Breaches

Data Breach Today

Analysis of Common Mistakes Made When Encrypting Data The Marriott mega-breach is calling attention to whether organizations are storing too much data and whether they're adequately protecting it with the proper encryption steps. Experts offer insights on making the right moves

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Machine Learning to Detect Software Vulnerabilities

Schneier on Security

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how , or when.

More Trending

Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack

Security Affairs

The cryptocurrency exchange Coinbase suspended the trading of Ethereum Classic (ETC) after double-spend attacks worth $1.1 Million. The cryptocurrency exchange Coinbase has suspended the trading of Ethereum Classic (ETC) after double-spend attacks that consist in spending digital coins twice.

Cyber resilience and the GDPR

IT Governance

We recently discussed the changing threat landscape and the need for all organisations to adopt a cyber resilience approach. This is essentially the combination of cyber security measures to prevent data breaches and business continuity measures to respond quickly when incidents can’t be stopped.

GDPR 102

Nine 2019 Cybersecurity Predictions

Security Affairs

Wondering about the state of global cybersecurity in 2019? Wonder no more with these nine cybersecurity predictions for where the new year will take us — and what it means for our digital properties, online lives and livelihoods.

Quiet Lawsuit in Pennsylvania May Create a Groundbreaking Data Security Priority Shift. Are You Ready?

Thales eSecurity

Personally, I find the daily announcement of a company losing control of their employees’, partners’, or customers’ data depressing. My home state, California had 259 formally reported breaches in 2018 alone!

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Zerodium offers $2 Million for remote iOS jailbreaks, and much more

Security Affairs

The zero-day broker Zerodium offers $2 million for remote iOS jailbreaks and $1 million for chat app exploits. Zerodium announced it is going to pay up to $2 million for remote iOS jailbreaks that don’t need any user interaction, Previous offers of the company for this kind of exploits was $1.5

IT 84

Mueller Investigation 2019: Indictments, Witnesses, and More

WIRED Threat Level

The special counsel has lots of unfinished business on his to-do list this year, including a final report. Here's a rundown. Security

German youngster behind massive data leak of German politicians data

Security Affairs

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians. According to the authorities, the man had already confessed.

Study 77

Leadership Behaviors

PerezBox

I have been given a lot of thought to Leadership lately. I have been placing special emphasis on the things I personally look for in Leaders. It doesn’t matter if. Read More. The post Leadership Behaviors appeared first on PerezBox.

IT 103

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Three top trends that will impact cyber security strategies in 2019

Information Management Resources

More companies are undergoing digital transformation, and the tools and technologies with which business is conducted are changing rapidly. With those changes, approaches to cybersecurity must evolve as well. Data security Cyber security Cyber attacks

Mentoring, sponsoring and coaching new talent in the tech industry

OpenText Information Management

When you’re start your career in the technology industry, it can be difficult to know how to navigate the organization and the industry. Having a mentor or a sponsor to help guide you can accelerate your progression and provide new opportunities that might not otherwise have been available.

A YubiKey for iOS Will Soon Free Your iPhone From Passwords

WIRED Threat Level

Yubico has finally gotten the green light from Apple to make a hardware authentication token that works on iPhones and iPads. Security

Destroy Functional IT Silos to Protect Data and Unlock Hidden Resources

Quest Software

Learn a holistic approach to information management to better analyse, secure and store your organization’s data. Plus free up people, time and resources.( read more

Emerging tech adoption hindered by yesterday's apps and skills at many firms

Information Management Resources

Enterprise IT is experiencing a seismic shift that’s both technical and cultural, and companies need systems that are boundaryless, adaptable and “radically human” to thrive and innovate at scale. Hardware and software Data strategy Data management

IT 81

Data Science: Influencers review 2018 and share their 2019 predictions

IBM Big Data Hub

Data science was one of the hot topics of 2018, and it’s likely to dominate again in 2019. We've asked five key data science influencers to take a look back at 2018 and look ahead at what's to come in 2019

[Podcast] Where do ‘I’ fit into the AI Future of business?

AIIM

If you take a look around your office, home, or even places like your car you’re sure to see it – Artificial Intelligence. And it’s not just in our personal lives, in the world of business we continue to grow and expand the way we work with the use of automation, smart machines, and more.

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure?

5 Reasons to Meet Hanzo at Legaltech - January 29 -31, 2019

Hanzo Learning Center

It’s time for Legaltech, the the largest and most important legal technology event of the year. Hanzo, will be demonstrating its pioneering technology in dynamic web archiving for compliance and ediscovery professionals.

Bridging the Gap Between Security Awareness and Action – A FREE Infographic from AIIM

IG Guru

[link]. The post Bridging the Gap Between Security Awareness and Action – A FREE Infographic from AIIM appeared first on IG GURU. IG News Information Governance information security Security AIIM Infographic Security Awareness

What Records Management Professionals Need to Know About Blockchain

InfoGoTo

Blockchain is best known as the technology underlying cryptocurrencies like Bitcoin, but its potential applications are far broader. It may be about to shake up the way organizations manage and share information, and that’s why records management professionals should pay attention to it.

Adobe addresses ‘Important’ Flaws in Connect, Digital Editions

Security Affairs

Adobe’s Patch Tuesday security updates for January 2019 fix two flaws rated as “important” in the Connect and Digital Editions products. Adobe’s Patch Tuesday security updates for January 2019 fix two “important” vulnerabilities in the Connect and Digital Editions ebook reader products. The first flaw, tracked as CVE-2018-19718 , is a session token exposure issue that affects the Adobe Connect web conferencing software.

eBook 51

HHS cybersecurity guidance ramps up pressure to protect data

Information Management Resources

The agency’s new list of best practices shows that it expects the healthcare industry to take security seriously. Cyber security Malware Cyber attacks Data security Hospitals and clinics

2018 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

As we noted Monday and yesterday , eDiscovery Daily published 65 posts related to eDiscovery case decisions and activities over the past year, covering 56 unique cases !

Video 49

Building an artificial general intelligence: The current paradigm of AI

Information Management Resources

As the manipulation of social media in the 2016 U.S. election shows, it is sometimes difficult to tell the difference between human and artificial intelligence behavior. Artificial intelligence Machine learning Data strategy

IT 73

HHS Releases Cybersecurity Guidance for Healthcare Organizations

Data Matters

On December 28, 2018, the U.S. Department of Health and Human Services (HHS) released a four-volume cybersecurity guidance document for healthcare organizations. The publication, “ Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients ” (HICP), is the result of a government and industry collaboration mandated by the Cybersecurity Act of 2015.

Your Life Is the Attack Surface: The Risks of IoT

Dark Reading

To protect yourself, you must know where you're vulnerable - and these tips can help

Tips 67

FireEye vs Symantec: Top EDR Solutions Compared

eSecurity Planet

We compare the strengths and weaknesses of FireEye's and Symantec's industry-leading endpoint detection and response offerings