Tue.Jan 08, 2019

article thumbnail

Dirt-Cheap, Legit, Windows Software: Pick Two

Krebs on Security

Buying heavily discounted, popular software from second-hand sources online has always been something of an iffy security proposition. But purchasing steeply discounted licenses for cloud-based subscription products like recent versions of Microsoft Office can be an extremely risky transaction, mainly because you may not have full control over who has access to your data.

Passwords 244
article thumbnail

Encryption: Avoiding the Pitfalls That Can Lead to Breaches

Data Breach Today

Analysis of Common Mistakes Made When Encrypting Data The Marriott mega-breach is calling attention to whether organizations are storing too much data and whether they're adequately protecting it with the proper encryption steps. Experts offer insights on making the right moves.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber resilience and the GDPR

IT Governance

We recently discussed the changing threat landscape and the need for all organisations to adopt a cyber resilience approach. This is essentially the combination of cyber security measures to prevent data breaches and business continuity measures to respond quickly when incidents can’t be stopped. The main benefit of cyber resilience is that it enables your organisation to address its security concerns as effectively as possible.

GDPR 103
article thumbnail

The 2019 Health Data Privacy Regulatory Outlook

Data Breach Today

Attorney David Holtzman Highlights Three Issues to Track What are the top regulatory trends to look for in the healthcare sector in 2019? Privacy attorney David Holtzman pinpoints three key issues to watch.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Leadership Behaviors

PerezBox

I have been given a lot of thought to Leadership lately. I have been placing special emphasis on the things I personally look for in Leaders. It doesn’t matter if. Read More. The post Leadership Behaviors appeared first on PerezBox.

IT 103

More Trending

article thumbnail

Machine Learning to Detect Software Vulnerabilities

Schneier on Security

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how , or when. While the literature generally focuses on the different uses of AI by attackers and defenders ­ and the resultant arms race between the two ­ I want to talk about software vulnerabilities. All software contains bugs.

article thumbnail

Coinbase suspended Ethereum Classic (ETC) trading after a successful 51% attack

Security Affairs

The cryptocurrency exchange Coinbase suspended the trading of Ethereum Classic (ETC) after double-spend attacks worth $1.1 Million. The cryptocurrency exchange Coinbase has suspended the trading of Ethereum Classic (ETC) after double-spend attacks that consist in spending digital coins twice. Ethereum Classic (ETC) is the original unforked Ethereum blockchain, the attacks resulted in the loss of $1.1 million worth of the digital currency. 51% attack refers to an attack on a blockchain by a group

article thumbnail

No, Spotify Wasn't Hacked

Troy Hunt

Time and time again, I get emails and DMs from people that effectively boil down to this: Hey, that paste that just appeared in Have I Been Pwned is from Spotify, looks like they've had a data breach Many years ago, I introduced the concept of pastes to HIBP and what they essentially boil down to is monitoring Pastebin and a bunch of other services for when a trove of email addresses is dumped online.

article thumbnail

Quiet Lawsuit in Pennsylvania May Create a Groundbreaking Data Security Priority Shift. Are You Ready?

Thales Cloud Protection & Licensing

Personally, I find the daily announcement of a company losing control of their employees’, partners’, or customers’ data depressing. My home state, California had 259 formally reported breaches in 2018 alone! It doesn’t matter where in the world you are, many companies are not properly protecting your data and hackers are very good at seeking those companies out.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

HHS Releases Cybersecurity Guidance for Healthcare Organizations

Data Matters

On December 28, 2018, the U.S. Department of Health and Human Services (HHS) released a four-volume cybersecurity guidance document for healthcare organizations. The publication, “ Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients ” (HICP), is the result of a government and industry collaboration mandated by the Cybersecurity Act of 2015.

article thumbnail

Data Science: Influencers review 2018 and share their 2019 predictions

IBM Big Data Hub

Data science was one of the hot topics of 2018, and it’s likely to dominate again in 2019. We've asked five key data science influencers to take a look back at 2018 and look ahead at what's to come in 2019.

article thumbnail

Mueller Investigation 2019: Indictments, Witnesses, and More

WIRED Threat Level

The special counsel has lots of unfinished business on his to-do list this year, including a final report. Here's a rundown.

article thumbnail

Zerodium offers $2 Million for remote iOS jailbreaks, and much more

Security Affairs

The zero-day broker Zerodium offers $2 million for remote iOS jailbreaks and $1 million for chat app exploits. Zerodium announced it is going to pay up to $2 million for remote iOS jailbreaks that don’t need any user interaction, Previous offers of the company for this kind of exploits was $1.5 million. The company also doubled the payouts for remote code execution flaws in WhatsApp, iMessage or SMS/MMS applications, payouts passed from $500,000 up to $1 million.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Destroy Functional IT Silos to Protect Data and Unlock Hidden Resources

Quest Software

Learn a holistic approach to information management to better analyse, secure and store your organization’s data. Plus free up people, time and resources.

IT 76
article thumbnail

German youngster behind massive data leak of German politicians data

Security Affairs

A 20-year-old hacker was arrested for the recent massive data leak that impacted hundreds of German politicians. According to the authorities, the man had already confessed. The German authorities have identified a 20-year-old hacker that stole and leaked personal data belonging to hundreds of German politicians. According to the authorities, the youngster, who lives with his parents and is still studying, had already confessed to having acted because he was annoyed. “The accused said he p

article thumbnail

New 'Crypto Dusting' Attack Gives Cash, Takes Reputation

Dark Reading

This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators.

73
article thumbnail

Shipping Firms Speared with Targeted ‘Whaling’ Attacks

Threatpost

Bad actors are imitating high-level executives in the shipping industry to launch BEC attacks that could lead to credential theft or worse - system compromise.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security Matters When It Comes to Mergers & Acquisitions

Dark Reading

The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process.

IT 80
article thumbnail

Adobe addresses ‘Important’ Flaws in Connect, Digital Editions

Security Affairs

Adobe’s Patch Tuesday security updates for January 2019 fix two flaws rated as “important” in the Connect and Digital Editions products. Adobe’s Patch Tuesday security updates for January 2019 fix two “important” vulnerabilities in the Connect and Digital Editions ebook reader products. The first flaw, tracked as CVE-2018-19718 , is a session token exposure issue that affects the Adobe Connect web conferencing software.

article thumbnail

A YubiKey for iOS Will Soon Free Your iPhone From Passwords

WIRED Threat Level

Yubico has finally gotten the green light from Apple to make a hardware authentication token that works on iPhones and iPads.

article thumbnail

Your Life Is the Attack Surface: The Risks of IoT

Dark Reading

To protect yourself, you must know where you're vulnerable - and these tips can help.

IoT 80
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mentoring, sponsoring and coaching new talent in the tech industry

OpenText Information Management

When you’re start your career in the technology industry, it can be difficult to know how to navigate the organization and the industry. Having a mentor or a sponsor to help guide you can accelerate your progression and provide new opportunities that might not otherwise have been available. At the same time, once you’ve become … The post Mentoring, sponsoring and coaching new talent in the tech industry appeared first on OpenText Blogs.

article thumbnail

Humana Breaches Reflect Chronic Credential Theft in Healthcare

Dark Reading

A series of 2018 cybersecurity incidents shows credential stuffing is a trend to watch among healthcare organizations.

article thumbnail

Three top trends that will impact cyber security strategies in 2019

Information Management Resources

More companies are undergoing digital transformation, and the tools and technologies with which business is conducted are changing rapidly. With those changes, approaches to cybersecurity must evolve as well.

article thumbnail

20-Year Old Student Admits to Massive Data Leak in Germany

Dark Reading

Hack was not politically motivated; no sign of third-party involvement, authorities say.

72
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Germany data breach: man arrested over massive leak of private information

The Guardian Data Protection

Man, 20, reportedly confesses to leak of politicians’ and celebrities’ data in huge breach German police have arrested a 20-year-old man in connection with one of the country’s biggest data breaches, which affected hundreds of politicians, the BKA federal criminal police hs said. German authorities are under fire for their handling of the breach , in which personal data and documents from German politicians and public figures, including the chancellor, Angela Merkel, were published online.

article thumbnail

Emerging tech adoption hindered by yesterday's apps and skills at many firms

Information Management Resources

Enterprise IT is experiencing a seismic shift that’s both technical and cultural, and companies need systems that are boundaryless, adaptable and “radically human” to thrive and innovate at scale.

IT 54
article thumbnail

Remote Code Execution Bugs Are Primary Focus of January Patch Tuesday

Dark Reading

This month's security update includes seven patches ranked Critical and one publicly known vulnerability.