Wed.Jul 24, 2019

article thumbnail

Best practices for building an information governance program that will last

Information Management Resources

For this Q&A with Aaron Bryant, I asked about the signs that an IG program is in trouble, what the keys to success are, and how to overcome the obstacles to that success.

article thumbnail

Seeing patterns in the clouds

OpenText Information Management

Recently I had an opportunity to sit down with one of our customers – a large multi-national bank – to talk about their cloud journey in Enterprise Information Management. Like the transformation that so many organizations are on today, the bank’s journey is taking them out from behind the corporate firewall to a place where workloads … The post Seeing patterns in the clouds appeared first on OpenText Blogs.

Cloud 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VPNs' Future: Less Reliant on Users, More Transparent, And Smarter

Dark Reading

Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.

IoT 65
article thumbnail

It's Official: FTC Fines Facebook $5 Billion

Data Breach Today

Mark Zuckerberg Must Ensure Compliance With Commission's Order The U.S. Justice Department and the Federal Trade Commission officially announced a privacy settlement with Facebook that includes a record-setting $5 billion fine. As part of the agreement, CEO Mark Zuckerberg must submit quarterly and annual reports to show that the company is in compliance with the FTC order.

IT 222
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Speaking at Fordham University in New York, he admitted that adding backdoors decreases security but that it is worth it. Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access.

More Trending

article thumbnail

DEF CON Invites Kids to Crack Campaign Finance Portals

Dark Reading

DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.

98
article thumbnail

Is the Equifax Settlement Good Enough?

Data Breach Today

Lifetime Risk of Identity Theft Not Cured by Prepaid Monitoring Services Given the massive impact of the Equifax data breach, is the recently announced proposed settlement fair? One consumer advocate calls the money to be paid out by the consumer reporting agency the equivalent of a "parking ticket." Here's an analysis of the settlement's terms.

article thumbnail

Are you really going to save money by moving to the cloud?

DXC Technology

The number one reason most people move to the cloud is to save money. But, will you really? Sure you’re guaranteed to reduce your Capital Expenditure (CAPEX). But, if you’re not careful all you’ll end up doing is replacing your CAPEX expenses with cloud service Operating Expense (OPEX). So, before you sign the dotted line […].

Cloud 86
article thumbnail

FIN8 Group Returns, Targeting POS Devices With New Tools

Data Breach Today

Hackers Create a Backdoor to Steal Card Data, Gigamon Researchers Report FIN8, a hacker group that targeted POS devices in the hospitality and retail sectors, is back on the scene with new malware, including the Badhatch backdoor that's designed to steal payment card data, according to researchers with Gigamon's threat detection unit.

Retail 162
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Software Developers and Security

Schneier on Security

According to a survey : "68% of the security professionals surveyed believe it's a programmer's job to write secure code, but they also think less than half of developers can spot security holes." And that's a problem. Nearly half of security pros surveyed, 49%, said they struggle to get developers to make remediation of vulnerabilities a priority. Worse still, 68% of security professionals feel fewer than half of developers can spot security vulnerabilities later in the life cycle.

article thumbnail

Mueller: Russian Interference 'Serious' Threat to Democracy

Data Breach Today

Special Council Warns of Potential Threats to 2020 Election Former Special Council Robert Mueller told members of Congress Wednesday that Russian interference in elections is the most serious challenge to U.S. democracy that he has seen over the course of his career and that it deserves more attention, especially as the 2020 election looms and more disruption is likely.

IT 152
article thumbnail

US authorities have sentenced to prison 3 Romanian men who hacked US servers

Security Affairs

Three Romanian men who have been sentenced to prison for a fraud scheme totaling more than $21 million. US authorities have sentenced to prison three Romanian men who hacked US servers and used them in a fraud scheme that totaled more than $21 million. The men are Teodor Laurentiu Costea, Robert Codrut Dumitrescu, and Cosmin Draghici, they are all from Ploiesti, Romania.

article thumbnail

Equipment Benefits Administrator Reports Data Breach

Data Breach Today

What Can Covered Entities Do to Help Prevent Falling Victim to BA Breaches? A medical equipment benefits administrator is the latest business associate to report a large health data breach affecting patients as well as healthcare providers. What can covered entities do to help prevent falling victim to BA breaches?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Computers at Indiana County infected with a ransomware

Security Affairs

The Indiana County is the last victim in a wave of ransomware attacks that hit US cities, officials are investigating the extent of the attack. The computer systems of the Indiana County were hit by a ransomware attack, officials are currently investigating the extent of the attack. Officials of an Indiana county say they are trying to determine the extent of a malware attack on the county’s computers.

article thumbnail

Attorney General Barr Argues for Access to Encrypted Content

Data Breach Today

Critics Argue That Backdoors Would Create Security Risks U.S. Attorney General William Barr argued on Tuesday that enabling law enforcement to access encrypted content would only minimally increase data security risks. Barr's comments drew criticism from lawmakers and technologists, who contend backdoors would put the public at greater risk.

article thumbnail

European Commission Publishes Ethics Guidelines for Trustworthy Artificial Intelligence

Data Matters

The High-Level Expert Group on Artificial Intelligence (“ AI HLEG ”), an independent expert group set up by the European Commission in June 2018 as part of its AI strategy, has published its final Ethics Guidelines for Trustworthy Artificial Intelligence (“ AI ”) (the “ Guidelines ”). These Guidelines form part of a wider focus by the Commission on AI, with President-elect of the European Commission, Ursula von der Leyen commenting most recently on July 16, in her proposed political guidelines,

article thumbnail

Protecting Against Ransomware Attacks: A Checklist

Threatpost

In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

7 Stats That Show What it Takes to Run a Modern SOC

Dark Reading

An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).

IT 86
article thumbnail

Unique Monokle Android Spyware Self-Signs Certificates

Threatpost

Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.

article thumbnail

Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack

Dark Reading

IoT botnet-made up mainly of routers-hit a service provider with nearly 300,000 requests-per-second in a 13-day deluge of data.

IoT 84
article thumbnail

Malvertising campaign exploits recently disclosed WordPress Plugin flaws

Security Affairs

Experts at Defiant have uncovered a campaign that exploited recently disclosed plugin vulnerabilities to inject malware into websites. Experts at Defiant, the company that developed the Wordfence security plugin for WordPress, uncovered a malvertising campaign that leverages recently disclosed plugin flaws to inject malicious code into websites. Threat actors behind the malvertising campaign are leveraging known flaws in WordPress plugins such as “Coming Soon and Maintenance Mode,” “ Yellow Penc

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

With Data Breach Costs, Time is Money

Dark Reading

The sooner a company can detect and respond to an incident, the less likely they are to pay for it, a new IBM-Ponemon study finds.

article thumbnail

APEC Endorses Singapore CBPR Accountability Agent

Hunton Privacy

On July 23, 2019, APEC issued a press release announcing the recent appointment of the Infocomm Media Development Authority (“IMDA”) as Singapore’s Accountability Agent for the APEC Cross-Border Privacy Rules (“CBRP”) and APEC Privacy Recognition for Processors (“PRP”). This makes Singapore the third APEC economy that has fully operationalized its participation in the CBPR system, following the United States, which has two CBPR Accountability Agents , and Japan, which has one CBPR Accountability

Privacy 65
article thumbnail

The Commoditization of Multistage Malware Attacks

Dark Reading

Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.

85
article thumbnail

New Forrester Wave™: ECM Content Platforms

OpenText Information Management

Leading independent analysis highlights the latest innovations and use cases in ECM and Content Services, and positions OpenText as a Leader. Forrester Research, Inc. just released their report on the state of the ECM technology landscape, The Forrester Wave™: ECM Content Platforms, Q3, 2019. Reports from respected, unbiased analysts such as those at Forrester are … The post New Forrester Wave™: ECM Content Platforms appeared first on OpenText Blogs.

ECM 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

NSA to Form New Cybersecurity Directorate

Dark Reading

Anne Neuberger will lead the directorate, which aims to bring together the NSA's offensive and defensive operations.

article thumbnail

Emsisoft releases the third decryptor in a few days, this time for LooCipher ransomware

Security Affairs

Security experts at Emsisoft released the third decryptor in a few days, this time announced a free one for the LooCipher ransomware. A few days ago, the experts at Emsisoft released two free decryptors for the ZeroFucks ransomware and Ims00rry ransomware , now the malware team announced the released of a decryptor for the LooCipher ransomware. Victims of the LooCipher ransomware don’t have to pay the ransom, they only need to download the decryptor from the link below: Download the LooCip

article thumbnail

Malware-based Attacks Dropped 20% Worldwide

Dark Reading

Meanwhile, criminals waged more encrypted, ransomware, and IoT attacks.

IoT 92