Tue.Jan 30, 2018

article thumbnail

Information Warfare: Gauging Trolls' Influence on Democracy

Data Breach Today

CIA Chief Warns Russia Is Seeking to Influence US Midterm Elections How effective are nation-backed trolls at influencing individuals via social media? An analysis of Russian trolls' accounts suggests they're designed for "causing havoc by pushing ideas, engaging other users or even taking both sides of controversial online discussions.

171
171
article thumbnail

Connected Device Data Exchange – Who’s Minding the Store on Security?

OpenText Information Management

The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks about how the growing number of products embedded with sensors blurs the line between a physical object and its digital twin. It also indicates an increased focus on the security of information exchanged from these … The post Connected Device Data Exchange – Who’s Minding the Store on Security?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Memo to the White House: Forget the 5G Moonshot

Data Breach Today

Private Sector Already Has Sufficient Incentives to Build Secure Mobile Systems The White House, fearing China is spying on phone calls, has suggested that the U.S. government take a primary role in marshaling the development of secure 5G networks. But would nationalizing 5G networks make them more secure?

article thumbnail

Chrome Extension Malware Has Evolved

WIRED Threat Level

While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Allscripts Lawsuit: What Makes It Different?

Data Breach Today

A class action lawsuit filed against Allscripts in the wake of a ransomware attack that recently disrupted patient care at hundreds of healthcare practices will spotlight a variety of critical security and legal issues, says Steven Teppler, the plaintiffs' attorney, in this in-depth interview.

IT 113

More Trending

article thumbnail

DEFCON 658 – what you need to know

Thales Cloud Protection & Licensing

The UK Ministry of Defence’s (MoD) DEFCON 658 aims to protect the defence supply chain from cyber threats. Impacting directly the MoD’s suppliers – or indeed would-be suppliers – it applies to any contract containing sensitive departmental information. As of April 2017, its introduction has ratcheted up pressure on those suppliers wishing to partake in lucrative government contracts, thus ensuring that any cyber risks are handled and mitigated appropriately.

article thumbnail

GDPR – stop delaying, it’s time to get to work

OpenText Information Management

In the regulatory compliance world, a lot has been written over the past two years introducing organizations to the new European data privacy regulation and why they should be concerned. It got your attention when pundits warned that your organization was still impacted even if it doesn’t have operations in the European Union. You took … The post GDPR – stop delaying, it’s time to get to work appeared first on OpenText Blogs.

GDPR 65
article thumbnail

The keys to becoming a data warehouse grandmaster

IBM Big Data Hub

The greatest grandmasters in chess think five moves ahead. In IT, even thinking five moves ahead isn’t enough. A lot of things can happen, planned and unplanned, within the first five moves of an IT strategy deployment that cause a significant amount of disruption both concurrently and long afterward.

IT 65
article thumbnail

Applying Digital Asset Management (DAM) to improve manufacturing operations

OpenText Information Management

Let’s face it. Some sections of the manufacturing industries have been slow in adopting a customer-centric approach to their business. In fact, recent research from Industry Week and OpenText found that digital leaders were almost twice as likely to be using their Digital Transformation initiatives to create an omnichannel customer experience that provides a consistent … The post Applying Digital Asset Management (DAM) to improve manufacturing operations appeared first on OpenText Bl

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing Campaign Underscores Threat from Low Budget, Low Skilled Attackers

Dark Reading

For just over $1,000, a phishing operation successfully spied on members of the Tibetan community for 19 months, Toronto University's Citizen Lab found.

article thumbnail

Cryptocurrency Scams Like Prodeum Are Just Straight-Up Trolling at This Point

WIRED Threat Level

US regulators and Facebook are finally coming for bogus ICOs.

article thumbnail

Subway Elevators and Movie-Plot Threats

Schneier on Security

Local residents are opposing adding an elevator to a subway station because terrorists might use it to detonate a bomb. No, really. There's no actual threat analysis, only fear: "The idea that people can then ride in on the subway with a bomb or whatever and come straight up in an elevator is awful to me," said Claudia Ward, who lives in 15 Broad Street and was among a group of neighbors who denounced the plan at a recent meeting of the local community board.

IT 53
article thumbnail

Digital Extortion to Expand Beyond Ransomware

Dark Reading

In the future of digital extortion, ransomware isn't the only weapon, and database files and servers won't be the only targets.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cisco Patches Critical VPN Vulnerability

Threatpost

Cisco Systems released a patch Monday to fix a critical security vulnerability, with a CVSS rating of 10, in its Secure Sockets Layer VPN solution called Adaptive Security Appliance.

article thumbnail

Hack Costs Coincheck Cryptocurrency Exchange $530 Million

Dark Reading

Losses at Japanese exchange Coincheck surpass those of the Mt. Gox Bitcoin exchange hack in 2014, and may be largest-ever cryptocurrency theft.

48
article thumbnail

Aetna $17.2 Million Breach Settlement Brings Lessons for Handling Health Data

HL Chronicle of Data Protection

Aetna will pay almost $17.2 million to settle a federal class action lawsuit stemming from a 2017 mailing that disclosed the HIV status of health plan members. Aetna also agreed last week to pay a $1.15 million fine to the state of New York after the Attorney General Eric Schneiderman’s (NY AG) investigation into Aetna’s alleged violations of federal and state privacy laws.

Privacy 40
article thumbnail

Aetna Agrees to $1.15 Million Settlement with New York Attorney General

Hunton Privacy

On January 23, 2018, the New York Attorney General announced that Aetna Inc. (“Aetna”) agreed to pay $1.15 million and enhance its privacy practices following an investigation alleging it risked revealing the HIV status of 2,460 New York residents by mailing them information in transparent window envelopes. In July 2017, Aetna sent HIV patients information on how to fill their prescriptions using envelopes with large clear plastic windows, through which patient names, addresses, claims numbers a

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New U.S. defense bill targets drones, raises potential privacy and security concerns

Data Protection Report

The National Defense Authorization Act of 2018 (NDAA), [1] signed into law in December 2017, did not only authorize United States defense spending for the 2018 fiscal year – it also contained a section devoted to unmanned aerial systems. The law notably reinstated [2] a U.S. Federal Aviation Administration (FAA) registration rule requiring the registration of all unmanned aerial vehicles (UAV) weighing between 0.55 and 55 pounds (between approximately.025 and 25 kilograms) with the FAA.

Privacy 40
article thumbnail

Hanzo and Relativity Announce Partnership to Enhance the Enterprise eDiscovery Ecosystem 

Hanzo Learning Center

New York - January 29, 2018 -- Hanzo , the world leader in collecting meaningful, dynamic content with confidence, will bring a new strategic integration to the Relativity platform. The integration, which automates processes and streamlines costs in collecting dynamic, unstructured content in its original native format, will be unveiled at LegalWeek 2018, with a full release coming in February.

IT 40
article thumbnail

DNS Hijacking: The Silent Threat That's Putting Your Network at Risk

Dark Reading

The technique is easy to carry out and can cause much damage. Here's what you need to know about fighting back.

Risk 53
article thumbnail

Using AI to organize small moments in big data

Information Management Resources

Organizations are producing larger amounts of information than ever before and there needs to be efficient ways to categorize and interpret it all. That’s where artificical intelligence comes in.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Breach-Proofing Your Data in a GDPR World

Dark Reading

Here are six key measures for enterprises to prioritize over the next few months.

GDPR 58
article thumbnail

Wednesday LTNY 2018 Sessions: eDiscovery Trends

eDiscovery Daily

As noted yesterday , Legaltech® New York (LTNY) is happening this week and eDiscovery Daily is here to report about the latest eDiscovery trends being discussed at the show. There’s still time to check out the show if you’re in the New York area with a number of sessions available and over 200 exhibitors providing information on their products and services, including our company, CloudNine at booth #533.

article thumbnail

Gettysburg: Civil War Monuments, Nuclear Arsenals, and Dreams of Peace

Unwritten Record

Still taken from “Gettysburg 75th Anniversary” (Local Identifier: 79-HFC-320). The Battlefield at Gettysburg is primarily known for two things. First, over three days, July 1 through July 3, 1863 the bloodiest battle of the Civil War took place there. Second, it was the site of The Gettysburg Address, the famous speech that President Abraham Lincoln delivered four and a half months after the battle on November 19.

article thumbnail

Bitcoin's gains fuel skyrocketing rise in ransomware attacks

Information Management Resources

As the value of cryptocurrencies has appreciated, ransom-based attacks provide an opportunity for hackers to cash out for lucrative gains months later.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How your organisation can achieve cyber resilience

IT Governance

In today’s evolving threat landscape, traditional cyber security measures such as firewalls and antivirus software are proving inadequate. To ensure your organisation’s survival in 2018, you must achieve cyber resilience. Cyber security threats are on the rise, with over 800 million records leaked in 2017 ( find out more in our breaches and hacks blog archive ), so it is important that your business is prepared.

Paper 61
article thumbnail

What it takes to succeed with data governance initiatives

Information Management Resources

Stuart Squires of the consultancy Comma Group reflects on the skills and opportunities that helped prepare him for his current role, and how others can boost their career.

article thumbnail

New California “sanctuary” law restricts access to workers and their records

Data Protection Report

A new state law places California businesses on the front line in responding to federal immigration enforcement actions. Effective January 1, 2018, AB 450 requires California employers to protect employees and their private information from warrantless “workplace raids” and I-9 form demands, and to warn employees who become targets of an immigration investigation.

Access 40