Tue.Jan 08, 2019

Dirt-Cheap, Legit, Windows Software: Pick Two

Krebs on Security

Buying heavily discounted, popular software from second-hand sources online has always been something of an iffy security proposition.

Feds Urge Private Sector 'Shields Up' Against Hackers

Data Breach Today

Trump Administration Warns of Economic Espionage Risk From China, Russia, Iran The Trump administration has launched a public awareness campaign, spearheaded by the National Counterintelligence and Security Center, urging the U.S.

Risk 243

Machine Learning to Detect Software Vulnerabilities

Schneier on Security

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how , or when.

Encryption: Avoiding the Pitfalls That Can Lead to Breaches

Data Breach Today

Analysis of Common Mistakes Made When Encrypting Data The Marriott mega-breach is calling attention to whether organizations are storing too much data and whether they're adequately protecting it with the proper encryption steps. Experts offer insights on making the right moves

Cyber resilience and the GDPR

IT Governance

We recently discussed the changing threat landscape and the need for all organisations to adopt a cyber resilience approach. This is essentially the combination of cyber security measures to prevent data breaches and business continuity measures to respond quickly when incidents can’t be stopped.

GDPR 97

The 2019 Health Data Privacy Regulatory Outlook

Data Breach Today

Attorney David Holtzman Highlights Three Issues to Track What are the top regulatory trends to look for in the healthcare sector in 2019? Privacy attorney David Holtzman pinpoints three key issues to watch

Trends 126

More Trending

Mueller Investigation 2019: Indictments, Witnesses, and More

WIRED Threat Level

The special counsel has lots of unfinished business on his to-do list this year, including a final report. Here's a rundown. Security

No, Spotify Wasn't Hacked

Troy Hunt

Leadership Behaviors

PerezBox

I have been given a lot of thought to Leadership lately. I have been placing special emphasis on the things I personally look for in Leaders. It doesn’t matter if. Read More. The post Leadership Behaviors appeared first on PerezBox.

IT 103

Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack

Security Affairs

The cryptocurrency exchange Coinbase suspended the trading of Ethereum Classic (ETC) after double-spend attacks worth $1.1 Million. The cryptocurrency exchange Coinbase has suspended the trading of Ethereum Classic (ETC) after double-spend attacks that consist in spending digital coins twice.

Mentoring, sponsoring and coaching new talent in the tech industry

OpenText Information Management

When you’re start your career in the technology industry, it can be difficult to know how to navigate the organization and the industry. Having a mentor or a sponsor to help guide you can accelerate your progression and provide new opportunities that might not otherwise have been available.

Three top trends that will impact cyber security strategies in 2019

Information Management Resources

More companies are undergoing digital transformation, and the tools and technologies with which business is conducted are changing rapidly. With those changes, approaches to cybersecurity must evolve as well. Data security Cyber security Cyber attacks

A YubiKey for iOS Will Soon Free Your iPhone From Passwords

WIRED Threat Level

Yubico has finally gotten the green light from Apple to make a hardware authentication token that works on iPhones and iPads. Security

Nine 2019 Cybersecurity Predictions

Security Affairs

Wondering about the state of global cybersecurity in 2019? Wonder no more with these nine cybersecurity predictions for where the new year will take us — and what it means for our digital properties, online lives and livelihoods.

Emerging tech adoption hindered by yesterday's apps and skills at many firms

Information Management Resources

Enterprise IT is experiencing a seismic shift that’s both technical and cultural, and companies need systems that are boundaryless, adaptable and “radically human” to thrive and innovate at scale. Hardware and software Data strategy Data management

IT 81

[Podcast] Where do ‘I’ fit into the AI Future of business?

AIIM

If you take a look around your office, home, or even places like your car you’re sure to see it – Artificial Intelligence. And it’s not just in our personal lives, in the world of business we continue to grow and expand the way we work with the use of automation, smart machines, and more.

Zerodium offers $2 Million for remote iOS jailbreaks, and much more

Security Affairs

The zero-day broker Zerodium offers $2 million for remote iOS jailbreaks and $1 million for chat app exploits. Zerodium announced it is going to pay up to $2 million for remote iOS jailbreaks that don’t need any user interaction, Previous offers of the company for this kind of exploits was $1.5

IT 75

2018 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

As we noted Monday and yesterday , eDiscovery Daily published 65 posts related to eDiscovery case decisions and activities over the past year, covering 56 unique cases !

Video 52

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure?

5 Reasons to Meet Hanzo at Legaltech - January 29 -31, 2019

Hanzo Learning Center

It’s time for Legaltech, the the largest and most important legal technology event of the year. Hanzo, will be demonstrating its pioneering technology in dynamic web archiving for compliance and ediscovery professionals.

Bridging the Gap Between Security Awareness and Action – A FREE Infographic from AIIM

IG Guru

[link]. The post Bridging the Gap Between Security Awareness and Action – A FREE Infographic from AIIM appeared first on IG GURU. IG News Information Governance information security Security AIIM Infographic Security Awareness

What Records Management Professionals Need to Know About Blockchain

InfoGoTo

Blockchain is best known as the technology underlying cryptocurrencies like Bitcoin, but its potential applications are far broader. It may be about to shake up the way organizations manage and share information, and that’s why records management professionals should pay attention to it.

Building an artificial general intelligence: The current paradigm of AI

Information Management Resources

As the manipulation of social media in the 2016 U.S. election shows, it is sometimes difficult to tell the difference between human and artificial intelligence behavior. Artificial intelligence Machine learning Data strategy

IT 73

German youngster behind massive data leak of German politicians data

Security Affairs

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians. According to the authorities, the man had already confessed.

Study 71

HHS Releases Cybersecurity Guidance for Healthcare Organizations

Data Matters

On December 28, 2018, the U.S. Department of Health and Human Services (HHS) released a four-volume cybersecurity guidance document for healthcare organizations. The publication, “ Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients ” (HICP), is the result of a government and industry collaboration mandated by the Cybersecurity Act of 2015.

HHS cybersecurity guidance ramps up pressure to protect data

Information Management Resources

The agency’s new list of best practices shows that it expects the healthcare industry to take security seriously. Cyber security Malware Cyber attacks Data security Hospitals and clinics

Your Life Is the Attack Surface: The Risks of IoT

Dark Reading

To protect yourself, you must know where you're vulnerable - and these tips can help

Tips 69

Adobe Patches Important Bugs in Connect and Digital Edition

Threatpost

The update comes on the heels of critical fixes in an unscheduled patch last week. Vulnerabilities Web Security adobe adobe patch patch patch tuesday vulnerability

Data Science: Influencers review 2018 and share their 2019 predictions

IBM Big Data Hub

Data science was one of the hot topics of 2018, and it’s likely to dominate again in 2019. We've asked five key data science influencers to take a look back at 2018 and look ahead at what's to come in 2019

Malvertising Campaign Delivers Double Whammy of Ransomware and Info-Stealing

Threatpost

The whole attack takes place in under a minute. Malware GandCrab info-stealer Malvertising Malware analysis ransomware vidar

Tech giants, stop gorging on AI professors

Information Management Resources

As AI frenzy engulfs the technology and financial sectors, attempts to hire AI experts from the nation’s top universities have skyrocketed. Artificial intelligence Data Scientist Machine learning Data science Recruiting Career moves

Shipping Firms Speared with Targeted ‘Whaling’ Attacks

Threatpost

Bad actors are imitating high-level executives in the shipping industry to launch BEC attacks that could lead to credential theft or worse - system compromise. Hacks Vulnerabilities BEC Business Email Compromise Phishing ship security shipping industry vulnerability whaling

Security Matters When It Comes to Mergers & Acquisitions

Dark Reading

The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process

IT 65

Microsoft Issues Multiple Critical Patches for Edge Browser

Threatpost

Microsoft January Patch Tuesday roundup includes four critical patches for its Edge browser. Vulnerabilities authentication bypass Edge browser January Patch Tuesday Update Memory corruption skype

IT 67