Thu.Jun 14, 2018

article thumbnail

Apple tries to stop developers from sharing data on friends

Information Management Resources

The move cracks down on a practice that’s been employed for years. Developers ask users for access to their phone contacts, then use it for marketing and sometimes share or sell the information.

article thumbnail

Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital

Dark Reading

Realizing the wide scope of fraud should be at the top of every business executive's to-do list. Here's some practical advice to help you stay safe.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Strong Opinions Voiced on Medical Device Security Challenges

Data Breach Today

Stakeholders Spotlight a Long List of Problems in Feedback to House Committee A House committee that asked the healthcare sector for feedback on how to improve the cybersecurity of legacy medical devices has received some very strong opinions on the subject. Find out what commenters had to say.

Security 124
article thumbnail

Why big companies ignore SAP security patches ? and how that could bite them, big time

The Last Watchdog

Threat actors in the hunt for vulnerable targets often look first to ubiquitous platforms. It makes perfect sense for them to do so. Related article: Triaging open-source exposures. Finding a coding or design flaw on Windows OS can point the way to unauthorized to access to a treasure trove of company networks that use Windows. The same holds true for probing widely used open source protocols, as occurred when Heartbleed and Shellshock came to light.

Security 134
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Visual Journal: Infosecurity Europe 2018

Data Breach Today

Cybersecurity Conference Tackles GDPR, Cybercrime, Nation State Attacks and More When June arrives in the United Kingdom, that means it's time for the annual Infosecurity Europe conference in London. Here are visual highlights from this year's event, which featured 240 sessions, 400 exhibitors and an estimated 19,500 attendees.

GDPR 100

More Trending

article thumbnail

World Cup 2018: How to Secure Your Devices When Traveling in Russia

WIRED Threat Level

Russia expects as many as 2 million visitors during the 2018 World Cup, most of whom should take extra precautions against the country's many cyber risks.

article thumbnail

Dixons Carphone faces ?400m fine following biggest online data breach in UK history

IT Governance

Little more than three years since its previous security incident, electronics retailer Dixons Carphone has admitted to a data breach compromising 5.9 million customer cards and 1.2 million personal records – making it the biggest online data breach in UK history. In a statement released on Wednesday, the retail giant revealed it had identified the colossal breach while it was reviewing its systems and data.

article thumbnail

Senators Demand Answers From Amazon on Echo's Snooping Habits

WIRED Threat Level

Jeff Flake and Chris Coons sent Jeff Bezos a letter Thursday with nearly 30 questions about how the company handles user data and privacy.

Privacy 90
article thumbnail

European Lawmakers Call on the EU to Suspend the EU-U.S. ?Data Transfer? Privacy Shield

Data Matters

On 11 June 2018, members of a Committee within the European parliament (“ MEPs ”) narrowly voted in favour of suspending the EU-U.S. Privacy Shield (“ Privacy Shield ”), an agreement that facilitates the transfer of personal data of EU data subjects to the U.S., unless the U.S. government fully complies with the Privacy Shield data protection requirements by 1 September 2018.

Privacy 68
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Meet 'Bro': The Best-Kept Secret of Network Security

Dark Reading

This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations.

article thumbnail

Encrypted Messaging Apps Have Limitations You Should Know

WIRED Threat Level

As recent events have shown, using an encrypted messaging app like WhatsApp or Signal is no privacy panacea.

article thumbnail

The GDPR has arrived – are you compliant?

IT Governance

The EU General Data Protection Regulation (GDPR) has been in effect for almost three weeks now – are you compliant, are you still working towards compliance or are you unsure of where to start? Compliance is not optional, and for many organisations it will be a lengthy process. Prioritising the areas where a lack of action leaves your organisation exposed is important.

GDPR 67
article thumbnail

Thomas Dullien on Complexity and Security

Schneier on Security

For many years, I have said that complexity is the worst enemy of security. At CyCon earlier this month, Thomas Dullien gave an excellent talk on the subject with far more detail than I've ever provided. Video. Slides.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Colorado Amends Data Breach Notification Law and Enacts Data Security Requirements

Hunton Privacy

Recently, Colorado’s governor signed into law House Bill 18-1128 “concerning strengthening protections for consumer data privacy” (the “Bill”), which takes effect September 1, 2018. Among other provisions, the Bill (1) amends the state’s data breach notification law to require notice to affected Colorado residents and the Colorado Attorney General within 30 days of determining that a security breach occurred, imposes content requirements for the notice to residents and expands the definition of

article thumbnail

23,000 Compromised in HealthEquity Data Breach

Dark Reading

HealthEquity, which handles more than 3.4 million health savings accounts, was breached when an intruder accessed an employee's email.

article thumbnail

Child abuse victims named in police bulk email error

The Guardian Data Protection

Gloucestershire police fined £80,000 by data regulator for causing ‘substantial distress’ A police force has been fined and heavily criticised for sending out a bulk email that identified victims of historical child abuse. The Information Commissioner’s Office (ICO) said the error by Gloucestershire police was likely to have caused “substantial distress” to alleged abuse victims, some of whom were legally entitled to lifelong anonymity.

64
article thumbnail

Artificial intelligence and analytics at OpenText Enterprise World

OpenText Information Management

With OpenText™ Enterprise World 2018 coming up July 10-12 in Toronto, I want to reflect on the value of artificial intelligence (AI) and analytics for OpenText customers, and highlight the Analytics breakout track as an important part of every attendee’s agenda. As the leader in Enterprise Information Management (EIM) solutions, OpenText sets the standard in … The post Artificial intelligence and analytics at OpenText Enterprise World appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Inspector General Criticizes FBI and James Comey, But Some Want More

WIRED Threat Level

The report found no evidence that politics influenced the outcome of the 2016 probe, frustrating those on the right hungry for proof of corruption.

article thumbnail

Leopard Spots and Zebra Stripes: Fraud and Behavioral Analytics

Thales Cloud Protection & Licensing

Did you know that every zebra has its own unique stripe pattern? Just like a human fingerprint, every zebra can be identified by their distinctive set of stripes. Luckily, zebras don’t use mobile devices, or manufacturers would be hard at work on stripe recognition technology. But they’d also be working to supplement their stripe recognition and biometrics with behavioral analytics.

article thumbnail

Mobile App Threats Continue to Grow

Dark Reading

Criminals looking to profit from corporate resources and information keep going after mobile devices, two new reports confirm.

64
article thumbnail

Now Showing: George Washington Carver on Kodachrome

Unwritten Record

One of our Motion Picture Preservation Lab staff identified a remarkable film in a recent accession of audiovisual material from the National Park Service (NPS). The film features amateur footage of George Washington Carver , the famed African-American botanist and inventor who taught for decades at Tuskegee Institute (now Tuskegee University) in Alabama.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Kaspersky Lab Freezes Work with Europol in Protest of EU Vote

Dark Reading

New European Parliament document calls out Kaspersky Lab software as 'malicious' and says it should be banned.

IT 61
article thumbnail

OpenText Decisiv brings Predictive Research to Enterprise Search

OpenText Information Management

It’s been nearly a decade since Recommind (now OpenText) first pioneered predictive coding for legal document review with OpenText™ Axcelerate™. The advent of supervised machine learning revolutionized eDiscovery with the simplest of principles: if those documents are of interest to you, these probably will be also. Now, all users searching for content across enterprises can benefit from … The post OpenText Decisiv brings Predictive Research to Enterprise Search appeared first on OpenText

article thumbnail

Podcast: The Growing Social Media Threat Landscape

Threatpost

How can we keep up with the social media threat landscape as it grows to include more malware, hacks and scams? We discuss on the latest Threatpost podcast.

IT 47
article thumbnail

Containerized Apps: An 8-Point Security Checklist

Dark Reading

Here are eight measures to take to ensure the security of your containerized application environment.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Contex Introduces the Market?s Widest and Fastest CCD Scanner

Info Source

Alleroed, Denmark — June 14, 2018 — Contex, the world leader in large format scanning, today introduces the HD Ultra X 6000, the widest, fastest and most productive 60-inch CCD scanner available in the market. Outperforming the competition with color matching and image scanning quality — while exceeding environmental standards — Contex is raising the bar, once again, with the newest addition to its family of scanners.

article thumbnail

Containerized Apps: An 8-Point Security Checklist

Dark Reading

Here are eight measures to take to ensure the security of your containerized application environment.

article thumbnail

DriveTime Automotive Group Selects Square 9? Softworks as Exclusive Enterprise Content Management Partner

Info Source

NEW HAVEN, CONN., June 14, 2018 – Developers of next-generation process automation solutions, Square 9® Softworks, has announced that DriveTime Automotive Group, one of the nation’s leading used car retailer and finance companies, has selected Square 9 as their chosen enterprise content management (ECM) provider for their document management needs.

ECM 40