Mon.Dec 18, 2017

article thumbnail

Lazarus Hackers Phish For Bitcoins, Researchers Warn

Data Breach Today

Bitcoin Exchange Job Lure Traces to Hackers Tied to North Korea Bitcoin-seeking phishing attacks have been trying to socially engineer would-be cryptocurrency exchange executives, warn researchers at Secureworks. The attacks use Word documents with malicious macros and control code previously seen in attacks launched by the Lazarus Group, which has been tied to North Korea.

Phishing 162
article thumbnail

Top 8 Cybersecurity Skills IT Pros Need in 2018

Dark Reading

Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

IT 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 IBM Big Data & Analytics Hub podcasts of 2017

IBM Big Data Hub

It can be difficult to keep up with all the best podcast episodes during the year. That's why we've compiled the Top 10 podcasts of the year from the IBM Big Data & Analytics Hub Insights Podcast feed right here.

article thumbnail

The damaging after-effects of a data breach

IT Governance

With the number of data breaches increasing every year, they are now a huge issue for organisations. 46% of all UK businesses identified at least one cyber breach in the past 12 months and it’s been predicted that a quarter of the world’s population will have been affected by a data breach by 2020. It should be obvious that it’s a priority for companies to learn how to keep data secure.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

[Video] Offsite Document Storage Facilities

Record Nations

Video Transcription Offsite Storage: Starting Off the Process More businesses are shifting towards paperless management, but between retention laws and the reality that there are some files businesses need to keep but rarely reference, it’s often cheaper to keep these records as hard-copies instead of spending the money to scan them instead. On average, storing […].

81

More Trending

article thumbnail

DFARS Cyber Compliance And Potential For FCA Risk

Data Matters

* This article first appeared in Law360 on December 18, 2017. For well over a year, defense contractors have had New Year’s Eve 2017 circled on their calendars, and not because they love the “auld lang syne” and a good glass of champagne. (Or at least not only for those reasons.) Dec. 31, 2017, is the deadline for when covered contractors must comply with the U.S.

article thumbnail

Cyber crime tactics: how to avoid becoming a victim

IT Governance

Cyber crime is on the rise, affecting millions of consumers and organisations all over the world. Graham Day, author of December’s book of the month, Security in the Digital World , says: “Attackers are slowly discovering all the ways that devices can be used to attack others. As this knowledge develops, the number and sophistication of attacks also increase.”.

article thumbnail

Lessons Learned from the Estonian National ID Security Flaw

Schneier on Security

Estonia recently suffered a major flaw in the security of their national ID card. This article discusses the fix and the lessons learned from the incident: In the future, the infrastructure dependency on one digital identity platform must be decreased, the use of several alternatives must be encouraged and promoted. In addition, the update and replacement capacity, both remote and physical, should be increased.

article thumbnail

GDPR Training in Belfast – save 10%

IT Governance

Many organisations are struggling to fill a skills gap created by the EU General Data Protection Regulation (GDPR) and need staff with knowledge of the Regulation. One way to fill this gap is to build on the knowledge of existing staff through training. IT Governance runs two levels of GDPR training courses across the UK to train staff on the Regulation, giving them the knowledge required to manage a GDPR compliance project.

GDPR 58
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cancer Center Settles with HHS for $2.3 Million over Data Breach

Hunton Privacy

As reported in BNA Privacy Law Watch , on December 6, 2017, health care provider 21st Century Oncology agreed to pay $2.3 million to settle charges by the Department of Health and Human Services’ (“HHS”) Office for Civil Rights (“OCR”) that its security practices led to a data breach involving patient information. The settlement was made public in the company’s December 6, 2017, bankruptcy filing.

article thumbnail

Cybersecurity for novices has U.K. firm trouncing Silicon Valley

Information Management Resources

After this year’s global ransomware attacks and headline-grabbing hacks, demand for cyber security has never been greater -- whether you are a multinational corporation or a local shop owner.

article thumbnail

Advanced Deception: How It Works & Why Attackers Hate It

Dark Reading

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats.

IT 51
article thumbnail

Mastering the three top tenets of digital transformation

Information Management Resources

The practice of managing content will effectively help organizations take operational control of their data and intellectual property in order to fully deliver on growth potential.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Businesses Fail in Risk Modeling and Management: Report

Dark Reading

Businesses struggle to quantify and manage risk, leading to wasted resources and oversight of major problems.

Risk 54
article thumbnail

McAfee warns of top five threats to data security in 2018

Information Management Resources

Despite advances in machine learning, deep learning and artificial intelligence, cyber attackers are learning how to work around them, warns CTO Steve Grobman.

article thumbnail

Deploying a new security product

Roger's Information Security

The post Deploying a new security product appeared first on Roger's Information Security Blog.

article thumbnail

User ‘Gross Negligence’ Leaves Hundreds of Lexmark Printers Open to Attack

Threatpost

Researchers warn hundreds of Lexmark printers are vulnerable to a trivial hack thanks to user “gross negligence.”.

IoT 48
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Kaspersky Lab Files Lawsuit Over DHS Ban of its Products

Dark Reading

Security firm petitions US District Court to rescind decision to prohibit its products on US federal government systems.

IT 45
article thumbnail

Keeper Security Patches Password Protection Flaw Reported by Google

eSecurity Planet

Password managers are supposed to help keep users safe, so what can you do to help mitigate the risk?

article thumbnail

Predictions 2018: GDPR boosts interest in data governance

Information Management Resources

Organizations are recognizing that if they are to make the investment, it needs to impact both the top and bottom line.

GDPR 47
article thumbnail

Telegram RAT Escapes Detection via Cloud Apps

Dark Reading

Netskope discovers a new RAT using Dropbox for its payload host and Telegram Messenger for command and control.

Cloud 41
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Only 14 Percent of Companies Increased Security Budgets After WannaCry, NotPetya Attacks

eSecurity Planet

Still, 13 percent of IT professionals felt that they were blamed when their organization became a victim.

article thumbnail

World's biggest pension fund sees AI replacing asset managers

Information Management Resources

'I believe artificial intelligence will be able to either replace or enhance [this] work, particularly for short-term trading,' says Hiromichi Mizuno.

article thumbnail

Thales to Acquire Authentication Vendor Gemalto for $5.6 Billion

eSecurity Planet

The combined company will expand into new areas, including securing the Industrial Internet of Things.

article thumbnail

Oracle clinches a $1.56B deal to buy Australia's Aconex

Information Management Resources

The firm has been looking to refashion its business around internet-based products. The strategy was dealt a setback last quarter when cloud-computing sales missed analysts’ estimates.

Sales 31
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The ‘Dean’ of Radio Commentators Celebrates WNYC’s 20th Anniversary

Archives Blogs

Celebrity endorsements of WNYC these days are not unusual. Someone notable on book tour, in the news, or appearing in a major motion picture comes to our studios for an interview. They’ve had a thoughtful conversation, and maybe they’re a listener too. Would they like to do a brief ‘pitch’ on our behalf? Sure, why not? In 1944, however, when H.V.

article thumbnail

American Family acquires two software companies

Information Management Resources

The buys of Networked Insights and HomeGauge are part of the company's commitment to data science and AI, says busines development leader Peter Gunder.

article thumbnail

Completion of the JFK Records Rolling Release

Archives Blogs

Last Friday marked the completion of the rolling review and release of the final records still publicly withheld from the John F. Kennedy Assassination Records Collection. The Public Interest Declassification Board (PIDB) acknowledges the importance of the completion of the rolling release of these records, but we must note with disappointment failure of the responsible agencies to meet the legal requirements set by the President John F.