Mon.Jul 08, 2019

article thumbnail

British Airways Faces Record-Setting $230 Million GDPR Fine

Data Breach Today

UK's Privacy Regulator Ties Size of Proposed Fine to Security Deficiencies Britain's privacy watchdog has proposed a record-breaking $230 million fine against British Airways for violating the EU's General Data Protection Regulation due to "poor security arrangements" that attackers exploited to steal 500,000 individuals' payment card data and other personal details.

GDPR 243
article thumbnail

Dealing with large documents… 4 steps to sanity

TAB OnRecord

If your organization relies on regular access to large documents, you’ll know what a headache they can be to manage. From blueprints and schematic diagrams to maps and historic records, large documents are harder to store, harder to access and harder to share. These challenges often lead to significant business inefficiencies that can hamper growth and productivity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IAM's Role in the Pharmaceutical Sector

Data Breach Today

Sandy Dalal of Allergan on Achieving Security Stability Mergers and acquisitions, along with cloud adoption, are rapidly changing the pharmaceutical industry. Sandy Dalal of Allergan talks about how identity and access management, along with zero trust, are bringing security stability.

article thumbnail

Dutch DPA Expands Guidance on Data Breaches

Hunton Privacy

On July 1, 2019, the Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , (the “Dutch DPA”)) announced that it had expanded its guidance on data breaches. The updates aim to answer questions about data breaches received by the Dutch DPA from organizations since 2016. In particular, the Dutch DPA expanded its Q&As section on the obligation to report data breaches and on how companies must react in the event of a data breach.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Canonical Investigating Hack of Its GitHub Page

Data Breach Today

Company Says Ubuntu Linux Source Code Remains Safe Canonical Ltd., a British company that offers commercial support and services for the popular Ubuntu Linux open source operating system, is investigating a hack of its GitHub page over the weekend. The source code for the system was not affected, the company says.

IT 189

More Trending

article thumbnail

Breach Impact on the CISO

Data Breach Today

Attorney Aravind Swaminathan on Executives Being Held Personally Accountable for Breaches Increasingly, regulators are looking to hold individual executives accountable for data breaches. This is where attorney Aravind Swaminathan steps in to represent security leaders in legal actions. What are the potential liabilities?

article thumbnail

Ransomware Recovery Firms Who Secretly Pay Hackers

Schneier on Security

ProPublica is reporting on companies that pretend to recover data locked up by ransomware, but just secretly pay the hackers and then mark up the cost to the victims.

article thumbnail

Open Source Genomic Analysis Software Flaw Patched

Data Breach Today

Do Data Integrity Security Concerns Pose Potential Patient Safety Worries? A cybersecurity vulnerability discovered in open source software used by organizations conducting genomic analysis could potentially have enabled hackers to affect the accuracy of patient treatment decisions. But the vulnerability was patched before hackers took advantage of it, researchers believe.

article thumbnail

Cyberattack shuts down La Porte County government systems

Security Affairs

Government computer systems at La Porte County, Indiana, were shut down after a cyber attack hit them on July 6. Experts believe it was a ransomware attack. On July 6, a cyber attack brought down government computer systems atLa Porte County, Indiana. At the time of writing, there were only a few details about the attack, according to LaPorte County Commission President Dr.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Blockchain Revisited: How Can It Reduce Fraud?

Data Breach Today

Microsoft's David Houlding on Use Cases and Lessons Learned Critics say blockchain is a technology looking for a purpose, but Microsoft's David Houlding says organizations are using blockchain today to validate identities and to help prevent fraud. He shares use cases and emerging best practices.

article thumbnail

Researchers Poke Holes in Siemens Simatic S7 PLCs

Dark Reading

Black Hat USA session will reveal how they reverse-engineered the proprietary cryptographic protocol to attack the popular programmable logic controller.

93
article thumbnail

Securing Connected Medical Devices

Data Breach Today

Safi Oranski of CyberMDX Says to Secure Them, First You Have to Find Them A major challenge in ensuring medical device security is tracking all of these devices, says Safi Oranski of CyberMDX, who offers a review of other critical issues.

Security 147
article thumbnail

Cardiac Biometric

Schneier on Security

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed for the Pentagon after US Special Forces requested it, can identify people without seeing their face: instead it detects their unique cardiac signature with an infrared laser. While it works at 200 meters (219 yards), longer distances could be possible with a better laser.

IT 86
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

HSBC Whistleblower on 'Too Big to Jail'

Data Breach Today

Everett Stern Reflects on Fallout From Money Laundering Case HSBC paid a record $1.92 billion fine for money laundering violations in 2012. But no one ever went to jail for the crimes. Whistleblower Everett Stern discusses lessons learned from the case and the concept of "too big to jail.

147
147
article thumbnail

UK ICO issues largest ever GDPR privacy fine of ÂŁ183m ($228m)

Data Matters

Today we saw the ICO issue a notice of its intention to fine British Airways £183.39m for infringements of the GDPR – a record fine and the largest seen in the UK and the EU. The proposed fine relates to a cyber incident which BA notified to the ICO (as BA’s lead data protection authority, DPA) in September 2018. The incident involved the theft from the BA website and mobile app of personal data relating to customers over a two-week period.

GDPR 74
article thumbnail

CISO Tackles the Accidental Insider Threat

Data Breach Today

Anne-Marie Scollay of Axiom Law Focuses on the Human Factor For years, security leaders focused primarily on malicious insiders - those who intend to do harm to an organization. But CISOs are increasingly concerned about the accidental insider. And Anne-Marie Scollay of Axiom Law has a program targeting this growing threat.

Security 147
article thumbnail

Hackers are poisoning the PGP SKS keyserver network poisoned

Security Affairs

Threat actors targeted two high-profile PGP project contributors with the intent to poison certificates used by the SKS keyserver network. . Contributors to the PGP protocol GnuPG claim that threat actors are “poisoning” their certificates, this means that attackers spam their certificate with a large number of signatures. The intent is to make it impossible for the PGP software to verify its authenticity.

Paper 86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CISO Notebook: Third-Party Risk

Data Breach Today

Cris Ewell of UW Medicine on Managing Vendor Risks Where is the data, who has access to it, and how is it being secured? These are among the top questions inherent in any third-party risk program. Cris Ewell, CISO of UW Medicine, shares insight from his experience managing vendor risk.

Risk 138
article thumbnail

Backdoor mechanism found in Ruby strong_password library

Security Affairs

The developer Tute Costa found a backdoor in the Ruby library during regular security audits before deploying his code in the production environment. The developer Tute Costa found a backdoor in the Ruby library during regular security audits. The dangerous code was used to check the password strength of user-chosen passwords when the library was being used in a production environment.

article thumbnail

Smash-and-Grab Crime Threatens Enterprise Security

Dark Reading

Getting your company smartphone or laptop stolen from your car isn't just a hassle; it can have large regulatory ramifications, too. Visibility is the answer.

article thumbnail

Documentation required by ISO 27001

IT Governance

Organisations seeking ISO 27001 compliance must prove their compliance with the Standard by completing appropriate documents. List of documents required for ISO 27001 compliance. 4.3 The scope of the ISMS. 5.2 Information security policy. 6.1.2 Information security risk assessment process. 6.1.3 Information security risk treatment plan. 6.1.3 The Statement of Applicability. 6.2 Information security objectives ; 7.2 Evidence of competence. 5.5.1 Documented information determined by the organ

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Australian federal police accessed journalists' metadata 58 times in a year

The Guardian Data Protection

MPs are examining impact of national security laws on freedom of the press The Australian federal police has revealed it accessed the metadata of journalists 58 times in the 2017-18 financial year. The admission came in a submission to the parliamentary joint committee on intelligence and security’s review of the mandatory data retention law, which has been in place since 2015.

article thumbnail

Android App Publishers Won't Take 'No' for an Answer on Personal Data

Dark Reading

Researchers find more than 1,000 apps in the Google Play store that gather personal data even when the user has denied permission.

article thumbnail

BA faces ÂŁ183m fine over passenger data breach

The Guardian Data Protection

ICO says personal data of 500,000 customers was stolen from website and mobile app British Airways is to be fined more than £183m by the Information Commissioner’s Office after hackers stole the personal data of half a million of the airline’s customers. The ICO said its extensive investigation found that the incident involved customer details including login, payment card, name, address and travel booking information being harvested after being diverted to a fraudulent website.

article thumbnail

NIST Sets Draft Guidelines for Government AI

Dark Reading

This is the first formal step in writing the standards that will guide the implementation of AI technologies within the federal government.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

British Airways fine shows GDPR has given watchdogs teeth | Nils Pratley

The Guardian Data Protection

The ICO is now a regulator to be feared – and tech giants should take fright at BA’s potential £183m hit British Airways is “surprised and disappointed” that it could be fined £183m by the Information Commissioner’s Office (ICO) for a data breach, according to its chairman and chief executive, Alex Cruz. He won’t be alone in being shocked. The size of the proposed penalty will cause spluttering in boardrooms up and down the land as the IT chief is summoned to explain whether the company’s back d

GDPR 75
article thumbnail

Most databases will have moved to the cloud by 2022, says Gartner

Information Management Resources

By 2022, 75 percent of all databases will be deployed or migrated to a cloud platform, with only 5 percent ever considered for repatriation to on-premises, the research firm says.

Cloud 76
article thumbnail

ICO Announces $230 Million Fine for British Airways following Data Breach

Hunton Privacy

On July 8, 2019, the UK Information Commissioner’s Office (“ICO”) announced that it intends to fine British Airways (“BA”), which is owned by International Consolidated Airlines Group, S.A., £183,390,000 (approximately $230,000,000) for violating the EU General Data Protection Regulation (“GDPR”). This is the first fine to be announced publicly by the ICO under the GDPR and hints at the tough stance it is likely to take with regard to future breaches.