Fri.Dec 14, 2018

article thumbnail

Super Micro: Audit Didn't Find Chinese Spying Chip

Data Breach Today

Firm Says Audit 'Lays to Rest the Unwarranted Accusations' Super Micro says a third-party audit of recent and older motherboards has not turned up evidence of a spying chip as alleged in an explosive report two months ago by Bloomberg BusinessWeek. Bloomberg, however, has stood by its story despite no physical example of the malicious chip turning up.

IT 211
article thumbnail

Why Cybersecurity Will Save the Internet of Things

AIIM

IoT, or the Internet of Things, is a grand ambition of the most influential kind. It is a unified goal that seeks to create an internet age of unity and equality that we may not ever see in any other industry. In this article, we will explain why cybersecurity will save IoT and let us progress well into the future with greatly reduced hazard. The Internet of Things becomes larger every day.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Maximize Data Used to Fight Fraud

Data Breach Today

Splunk's Jim Apger on Streamlining Omni-Channel Defenses The data being used to drive effective anti-fraud efforts can be rich in context and useful for other activities. Jim Apger of Splunk describes emerging fraud schemes and solutions, highlighting the role of machine learning.

191
191
article thumbnail

Delivering the healthcare experience we all deserve

Jamf

See how Apple and Jamf are helping hospitals deliver a better patient experience by making it easy for them to stay connected with their care teams and enjoy a mental break from their surroundings.

IT 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Identity and the Need to Break Down Silos

Data Breach Today

Nexus Group CEO Magnus Malmström on Integrating Identity Across the Enterprise Breaking down departmental silos and building one common, umbrella identity is critical for closing the security gaps in rapidly digitizing environments, says Nexus Group CEO Magnus Malmström.

Security 174

More Trending

article thumbnail

A Second State Hits EmblemHealth With Breach Fine

Data Breach Today

Case Involves Social Security Numbers Exposed in Mailings For the second time this year, health insurer EmblemHealth has been hit with a state financial penalty in connection with a 2016 breach that exposed Social Security numbers on mailings to more than 81,000 plan members.

Insurance 171
article thumbnail

A bug in Facebook Photo API exposed photos of 6.8 Million users

Security Affairs

New problems for Facebook, the social network giant announced that a bug related to Photo API could have allowed third-party apps to access users’ photos. Facebook announced that photos of 6.8 Million users might have been exposed by a bug in the Photo API allowing third-party apps to access them. The bug impacted up over 870 developers, only apps granted access to photos by the user could have exploited the bug.

Access 86
article thumbnail

OT Security: Best Practices for CISOs

Data Breach Today

L&T Group CISO Uday Deshpande on Securing Operational Technology The lack of standardization is one of the significant challenges when securing OT environments. Customizing and aligning OT security with the business is key, says Uday Deshpande, CISO at Mumbai-based L&T Group.

Security 160
article thumbnail

How the ICO measures GDPR compliance

IT Governance

Whenever someone mentions the GDPR (General Data Protection Regulation) , one of the first things they discuss is the potential for huge fines that it brings. But there’s no universal system for monitoringcompliance and handing out fines. Rather, each EU member state elects asupervisory authority to take on that responsibility. In the UK, this is the ICO (Information Commissioner’s Office).

GDPR 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Did China Hack Marriott, Or Is This Fake News?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the validity of reports that China is behind the massive Marriott data breach. Also: Fascinating details in a Congressional report on the Equifax breach, and a clear explanation of "self-sovereign identity.

article thumbnail

Real-Time Attacks Against Two-Factor Authentication

Schneier on Security

Attackers are targeting two-factor authentication systems: Attackers working on behalf of the Iranian government collected detailed information on targets and used that knowledge to write spear-phishing emails that were tailored to the targets' level of operational security, researchers with security firm Certfa Lab said in a blog post. The emails contained a hidden image that alerted the attackers in real time when targets viewed the messages.

article thumbnail

WordPress version 5.0.1 addressed several vulnerabilities

Security Affairs

This week, the WordPress development team released on Thursday the version 5.0.1 of the popular CMS, that addresses several flaws. The Researcher Tim Coen discovered several cross-site scripting (XSS) vulnerabilities in the CMS. One of the flaws is caused by the ability of contributors to edit new comments from users with higher privileges. Coen also discovered that it is possible to trigger XSS flaws by using specially crafted URL input against some plugins.

CMS 79
article thumbnail

Email Bomb Threats Follow Sextortion Playbook

Dark Reading

Yesterday's wave of email bomb threats appear to be an evolution of tactics by the same groups that earlier tried "sextortion" and personal threats, Talos researchers say.

80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HHS Requests Feedback on HIPAA Changes Designed to Improve Care Coordination

Data Matters

On December 14, 2018, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published in the Federal Register a request for information (RFI) titled “Modifying HIPAA Rules to Improve Coordinated Care.” The RFI seeks public input on a broad range of potential reforms to Health Insurance Portability and Accountability Act (HIPAA) regulations with a focus on enhancing care coordination.

Privacy 68
article thumbnail

New Sofacy campaign aims at Government agencies across the world

Security Affairs

Security experts at Palo Alto Networks uncovered a new espionage campaign carried out by Russia-Linked APT group Sofacy. Russian Cyber espionage group Sofacy (aka APT28 , Pawn Storm , Fancy Bear , Sednit , Tsar Team, and Strontium ) ) carried out a new cyber campaign aimed at government agencies in four continents in an attempt to infect them with malware.

article thumbnail

Facebook Exposed 6.8 Million Users' Photos to Cap Off a Terrible 2018

WIRED Threat Level

In the latest in its long string of 2018 incidents, Facebook let developers access the private photos of millions of users.

Access 88
article thumbnail

Who Are You, Really? A Peek at the Future of Identity

Dark Reading

Experts dive into the trends and challenges defining the identity space and predict how online identities will change in years to come.

81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

RIM in the age of discovery: Strategies for litigation-proofing your organization’s information – Part 1

TAB OnRecord

Part 1: How to build a RIM program that addresses legal discovery before it happens This two-part white paper presents strategies for better supporting discovery at the proactive and reactive stages. Part 1 outlines six essential steps for integrating discovery requirements directly into your RIM program, including policies, records retention schedules, disposition processes and filing [.

article thumbnail

Iranian Hackers Target Nuclear Experts, US Officials

Dark Reading

Hackers ramp up efforts to infiltrate email accounts of Americans responsible for enforcing severe economic sanctions on Iran.

83
article thumbnail

Electric Vehicle Charging Stations Open to IoT Attacks

Threatpost

Flaws could allow an attacker to stop or start a home charging station, or even change the current in order to start a fire.

IoT 80
article thumbnail

What’s your Data Confidence Number?

Reltio

Nalini Mohan, Senior Technical Product Marketing Manager, Reltio. Can you put a number to the level of confidence and trust you have in your enterprise data and analytics? Can you take that number and make powerful decisions that can transform your enterprise? According to a study by KPMG and Forrester Research, “60 percent of organizations say they are not very confident in their data and analytics insights” and “only 10 percent believe they excel in managing the quality of data and analytics”.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

UK: GDPR Brexit flowchart

DLA Piper Privacy Matters

This week has brought further uncertainty on the route to Brexit. The planned vote in the UK Parliament on the Withdrawal Agreement – intended to establish an orderly transition period for the UK to withdraw from the EU between 30 March 2019 and 31 December 2020 – has been postponed leaving considerable uncertainty as to next steps, including the prospect of a ‘hard’ departure on 30 March 2019 with ‘no deal’ in place.

GDPR 61
article thumbnail

Facebook admits bug allowed apps to see hidden photos

The Guardian Data Protection

Hundreds of companies see pictures people had uploaded but chosen not to post A Facebook bug let app developers see photos users had uploaded but never posted, the social network has disclosed. For two weeks in September, an error in the way Facebook shares photos with third parties meant that apps could see not just photos users had posted on their newsfeed, but also pictures in other parts of the site – on Facebook Stories or Facebook’s Marketplace, for instance.

Privacy 60
article thumbnail

9 top vendors for natural language generation analytics

Information Management Resources

Arria, Automated Insights, Narrative Science and AX Semantics are among the top emerging companies in the NLG market, says a New Wave study from Forrester.

article thumbnail

Cybercriminals Change Tactics to Outwit Machine-Learning Defense

Dark Reading

The rise in machine learning for security has forced criminals to rethink how to avoid detection.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

ICO Notifies More Than 900 Organizations of Failure to Pay Required Data Protection Fee

Hunton Privacy

EU data protection authorities (“DPAs”) are proving their willingness as enforcers with respect to the GDPR, not just with regard to the most serious acts of non-compliance but also for errors of a more administrative nature. Under the previous regime, DPAs typically required companies to register their processing activities with the regulator, but the GDPR now permits organizations to maintain data processing inventories internally, only showing them to DPAs when there is a particular need to d

GDPR 58
article thumbnail

Facebook Flaw Exposes Private Photos for 6.8M Users

Threatpost

The bug allowed 1,500 apps built by 876 developers to view users' unposted "draft" photos.

article thumbnail

Release 16 EP5 expands OpenText Captiva’s role in process automation

OpenText Information Management

In today’s inter-connected, multi-cloud, IT environment, data security is a primary concern for all organizations. This is particularly true for content or metadata that needs to be shared across multiple line-of-business systems. For many of our customers, OpenText™ Captiva is a key element of core business processes, and an ongoing shift to a cloud-based infrastructure … The post Release 16 EP5 expands OpenText Captiva’s role in process automation appeared first on OpenText Blogs.