Tue.Jan 08, 2019

Dirt-Cheap, Legit, Windows Software: Pick Two

Krebs on Security

Buying heavily discounted, popular software from second-hand sources online has always been something of an iffy security proposition.

Feds Urge Private Sector 'Shields Up' Against Hackers

Data Breach Today

Trump Administration Warns of Economic Espionage Risk From China, Russia, Iran The Trump administration has launched a public awareness campaign, spearheaded by the National Counterintelligence and Security Center, urging the U.S.

Risk 233

Machine Learning to Detect Software Vulnerabilities

Schneier on Security

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how , or when.

Encryption: Avoiding the Pitfalls That Can Lead to Breaches

Data Breach Today

Analysis of Common Mistakes Made When Encrypting Data The Marriott mega-breach is calling attention to whether organizations are storing too much data and whether they're adequately protecting it with the proper encryption steps. Experts offer insights on making the right moves

No, Spotify Wasn't Hacked

Troy Hunt

The 2019 Health Data Privacy Regulatory Outlook

Data Breach Today

Attorney David Holtzman Highlights Three Issues to Track What are the top regulatory trends to look for in the healthcare sector in 2019? Privacy attorney David Holtzman pinpoints three key issues to watch

Trends 119

More Trending

Cyber resilience and the GDPR

IT Governance

We recently discussed the changing threat landscape and the need for all organisations to adopt a cyber resilience approach. This is essentially the combination of cyber security measures to prevent data breaches and business continuity measures to respond quickly when incidents can’t be stopped.


Nine 2019 Cybersecurity Predictions

Security Affairs

Wondering about the state of global cybersecurity in 2019? Wonder no more with these nine cybersecurity predictions for where the new year will take us — and what it means for our digital properties, online lives and livelihoods.

Quiet Lawsuit in Pennsylvania May Create a Groundbreaking Data Security Priority Shift. Are You Ready?

Thales eSecurity

Personally, I find the daily announcement of a company losing control of their employees’, partners’, or customers’ data depressing. My home state, California had 259 formally reported breaches in 2018 alone!

Zerodium offers $2 Million for remote iOS jailbreaks, and much more

Security Affairs

The zero-day broker Zerodium offers $2 million for remote iOS jailbreaks and $1 million for chat app exploits. Zerodium announced it is going to pay up to $2 million for remote iOS jailbreaks that don’t need any user interaction, Previous offers of the company for this kind of exploits was $1.5

IT 84

Mueller Investigation 2019: Indictments, Witnesses, and More

WIRED Threat Level

The special counsel has lots of unfinished business on his to-do list this year, including a final report. Here's a rundown. Security

German youngster behind massive data leak of German politicians data

Security Affairs

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians. According to the authorities, the man had already confessed.

Study 78

Leadership Behaviors


I have been given a lot of thought to Leadership lately. I have been placing special emphasis on the things I personally look for in Leaders. It doesn’t matter if. Read More. The post Leadership Behaviors appeared first on PerezBox.

IT 103

Three top trends that will impact cyber security strategies in 2019

Information Management Resources

More companies are undergoing digital transformation, and the tools and technologies with which business is conducted are changing rapidly. With those changes, approaches to cybersecurity must evolve as well. Data security Cyber security Cyber attacks

Mentoring, sponsoring and coaching new talent in the tech industry

OpenText Information Management

When you’re start your career in the technology industry, it can be difficult to know how to navigate the organization and the industry. Having a mentor or a sponsor to help guide you can accelerate your progression and provide new opportunities that might not otherwise have been available.

Emerging tech adoption hindered by yesterday's apps and skills at many firms

Information Management Resources

Enterprise IT is experiencing a seismic shift that’s both technical and cultural, and companies need systems that are boundaryless, adaptable and “radically human” to thrive and innovate at scale. Hardware and software Data strategy Data management

IT 81

A YubiKey for iOS Will Soon Free Your iPhone From Passwords

WIRED Threat Level

Yubico has finally gotten the green light from Apple to make a hardware authentication token that works on iPhones and iPads. Security

[Podcast] Where do ‘I’ fit into the AI Future of business?


If you take a look around your office, home, or even places like your car you’re sure to see it – Artificial Intelligence. And it’s not just in our personal lives, in the world of business we continue to grow and expand the way we work with the use of automation, smart machines, and more.

Your Life Is the Attack Surface: The Risks of IoT

Dark Reading

To protect yourself, you must know where you're vulnerable - and these tips can help

Tips 75

Adobe addresses ‘Important’ Flaws in Connect, Digital Editions

Security Affairs

Adobe’s Patch Tuesday security updates for January 2019 fix two flaws rated as “important” in the Connect and Digital Editions products. Adobe’s Patch Tuesday security updates for January 2019 fix two “important” vulnerabilities in the Connect and Digital Editions ebook reader products. The first flaw, tracked as CVE-2018-19718 , is a session token exposure issue that affects the Adobe Connect web conferencing software.

eBook 52

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure?

5 Reasons to Meet Hanzo at Legaltech - January 29 -31, 2019

Hanzo Learning Center

It’s time for Legaltech, the the largest and most important legal technology event of the year. Hanzo, will be demonstrating its pioneering technology in dynamic web archiving for compliance and ediscovery professionals.

What Records Management Professionals Need to Know About Blockchain


Blockchain is best known as the technology underlying cryptocurrencies like Bitcoin, but its potential applications are far broader. It may be about to shake up the way organizations manage and share information, and that’s why records management professionals should pay attention to it.

Data Science: Influencers review 2018 and share their 2019 predictions

IBM Big Data Hub

Data science was one of the hot topics of 2018, and it’s likely to dominate again in 2019. We've asked five key data science influencers to take a look back at 2018 and look ahead at what's to come in 2019

HHS cybersecurity guidance ramps up pressure to protect data

Information Management Resources

The agency’s new list of best practices shows that it expects the healthcare industry to take security seriously. Cyber security Malware Cyber attacks Data security Hospitals and clinics

2018 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

As we noted Monday and yesterday , eDiscovery Daily published 65 posts related to eDiscovery case decisions and activities over the past year, covering 56 unique cases !

Video 51

Building an artificial general intelligence: The current paradigm of AI

Information Management Resources

As the manipulation of social media in the 2016 U.S. election shows, it is sometimes difficult to tell the difference between human and artificial intelligence behavior. Artificial intelligence Machine learning Data strategy

IT 73

Security Matters When It Comes to Mergers & Acquisitions

Dark Reading

The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process

IT 70

HHS Releases Cybersecurity Guidance for Healthcare Organizations

Data Matters

On December 28, 2018, the U.S. Department of Health and Human Services (HHS) released a four-volume cybersecurity guidance document for healthcare organizations. The publication, “ Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients ” (HICP), is the result of a government and industry collaboration mandated by the Cybersecurity Act of 2015.

FireEye vs Symantec: Top EDR Solutions Compared

eSecurity Planet

We compare the strengths and weaknesses of FireEye's and Symantec's industry-leading endpoint detection and response offerings

New 'Crypto Dusting' Attack Gives Cash, Takes Reputation

Dark Reading

This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators


Destroy Functional IT Silos to Protect Data and Unlock Hidden Resources

Quest Software

Learn a holistic approach to information management to better analyse, secure and store your organization’s data. Plus free up people, time and resources.( read more

20-Year Old Student Admits to Massive Data Leak in Germany

Dark Reading

Hack was not politically motivated; no sign of third-party involvement, authorities say

Data 67

Tech giants, stop gorging on AI professors

Information Management Resources

As AI frenzy engulfs the technology and financial sectors, attempts to hire AI experts from the nation’s top universities have skyrocketed. Artificial intelligence Data Scientist Machine learning Data science Recruiting Career moves