Wed.Feb 07, 2018

article thumbnail

Flash Hack: Adobe Updates Plug-in After Zero-Day Attacks

Data Breach Today

Malicious Spreadsheets With Embedded Flash Trace to North Korean Attackers A hacking team dubbed "Group 123" with apparent ties to the government of North Korea has been exploiting a zero-day vulnerability in the Flash browser plug-in, likely to hack high-value targets. Adobe has released an emergency Flash update with security fixes. Or organizations could simply stop using Flash.

article thumbnail

Cabinet of Secret Documents from Australia

Schneier on Security

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is sold off cheaply. The deals can be even cheaper when the items in question are two heavy filing cabinets to which no-one can find the keys. They were purchased for small change and sat unopened for some months until the locks were attacked with a drill.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Behavioral Analytics' Role in Health Data Security

Data Breach Today

Healthcare entities are increasingly considering user and entity behavioral analytics tools because their previous breach prevention and detection efforts have fallen short, says security expert Mac McMillan.

Analytics 133
article thumbnail

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

WIRED Threat Level

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

Security 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to write a GDPR data protection policy

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) project is producing appropriate documentation to demonstrate your compliance. As part of this, organisations will need to produce a data protection policy. To help you prepare for the fast-approaching compliance deadline (25 May 2018), we have outlined what the data protection policy is, what you should be looking to include and what tools can help your organisation produce this essential piece of documentation.

GDPR 84

More Trending

article thumbnail

Check your machine learning IQ

IBM Big Data Hub

As the expression goes, "There’s no AI without IA." In other words, enthusiasm for AI has led many to jump in head first. But without a strong technology foundation, companies could be setting themselves up for obstacles.

77
article thumbnail

Feds Take Down Infraud, a $530M Cybercrime Forum That Lasted 7 Years

WIRED Threat Level

Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.

article thumbnail

NYDFS Cybersecurity Regulations: First Annual Compliance Certification Due February 15, 2018

Data Matters

Companies that are subject to New York’s Cybersecurity Regulation are moving quickly to finalize their compliance obligations under the Cybersecurity Regulation, as the second “due date” quickly approaches – February 15, 2018. By August 28, 2017, Covered Entities were required to have a cybersecurity program in place, as well as a board (or senior officer) approved written cybersecurity policy and Chief Information Security Officer to help protect data and systems.

article thumbnail

Could blockchain improve conflict minerals traceability?

OpenText Information Management

In November last year I posted a blog introducing a new partnership OpenText had entered into with a UK-based provider of blockchain solutions, BlockEx. In the blog I highlighted how we would be looking to explore a joint solution relating to supply chain finance. Supply chain finance has been around for years, but the use … The post Could blockchain improve conflict minerals traceability?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Join SME Alan Calder for a live GDPR Q&A this Valentine’s Day

IT Governance

With less than four months until the EU General Data Protection Regulation (GDPR) comes into effect, it is imperative that your organisation is prepared. On 25 May 2018, the GDPR will introduce a number of significant changes that will apply to businesses of all sizes. The Regulation expands the rights of individuals over how their personal information is collected and processed.

GDPR 65
article thumbnail

One year at OpenText for ApplicationXtender

OpenText Information Management

In our first year as part of the OpenText™ Content Services group, we released three updates as well as planning for a release later this year and planning the long term future of ApplicationXtender. All this with an eye towards making ApplicationXtender a modern product that fits with the OpenText vision of content services. ApplicationXtender … The post One year at OpenText for ApplicationXtender appeared first on OpenText Blogs.

article thumbnail

Every NHS Trust assessed for cyber resilience has failed on-site assessment

IT Governance

200 NHS Trusts assessed for cyber security vulnerabilities have failed to achieve the basic security recommendations, a Public Accounts Committee has heard. Addressing MPs at the ‘Cyber-attack on the NHS’ hearing, Rob Shaw, deputy chief executive of NHS Digital, discussed the results of assessments of 200 of the 236 NHS Trusts in England and Wales. In every case, the Trusts failed to achieve a passing grade.

article thumbnail

AI's Future in Cybersecurity

eSecurity Planet

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 ways ITIL can benefit your organisation

IT Governance

Any organisation that delivers IT services to its customers needs an effective way of managing those services. That’s where ITIL ® (Information Technology Infrastructure Library ® ) comes in. It’s a set of detailed practices for IT service management (ITSM) that focuses on the end user rather than technology, aiming to provide IT services that are better aligned with organisations’ business needs.

article thumbnail

Singapore PDPC Issues Response to Public Feedback Regarding Data Protection Consultation

Hunton Privacy

On February 1, 2018, the Singapore Personal Data Protection Commission (the “PDPC”) published its response to feedback collected during a public consultation process conducted during the late summer and fall of 2017 (the “Response”). During that public consultation, the PDPC circulated a proposal relating to two general topics: (1) the relevance of two new alternative bases for collecting, using and disclosing personal data (“Notification of Purpose” and “Legal or Business Purpose”), and (2) a m

article thumbnail

North Korean APT Group Employed Rare Zero-Day Attack

Dark Reading

Recent Adobe Flash exploit discovered against South Korean targets likely purchased, not developed by the hacking group.

62
article thumbnail

FTC Brings Its Thirtieth COPPA Case Against Online Talent Agency

Hunton Privacy

On February 5, 2018, the Federal Trade Commission (“FTC”) announced its most recent Children’s Online Privacy Protection Act (“COPPA”) case against Explore Talent, an online service marketed to aspiring actors and models. According to the FTC’s complaint , Explore Talent provided a free platform for consumers to find information about upcoming auditions, casting calls and other opportunities.

IT 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Zero-Day Ransomware Evades Microsoft, Google Cloud Malware Detection

Dark Reading

Shurl0ckr, a form of Gojdue ransomware, was not detected on SharePoint or Google Drive.

article thumbnail

The Biggest Data Security Risks of 2018

Archive Document Data Storage

In terms of data breaches, 2017 wasn’t a great year. And despite our “glass half-full” attitude, we must admit the data security outlook for 2018 isn’t looking much better. Here are several risks to be aware of, and what you can do to stay safe: Phishing Season Is Still Open. Phishing scams yield high profits for cyber criminals. As a result, phishing will continue to threaten businesses in 2018.

Risk 40
article thumbnail

US, International Law Enforcement Shut Down Massive Cybercrime Marketplace

Dark Reading

The Infraud Organization was responsible for over $500 million in losses to institutions and individuals worldwide, the US Department of Justice says.

45
article thumbnail

Local Government Records Management Training – Register Now!

The Texas Record

Local government classes will be held March 27-28, 2018. Each class is $15. Class size is limited to 24 people so register today! Classes are being held at the Lorenzo de Zavala Library and Archives Building, Tocker Learning Center, 1201 Brazos St., Austin, TX 78701. Local Government Classes. Introduction to Records Management – Full Day Workshop.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Misunderstandings, Panic and Priorities in the Year of the GDPR

HL Chronicle of Data Protection

It is finally here. This is the year of the GDPR. A journey that started with an ambitious policy paper about modernising data protection almost a decade ago – a decade! – is about to reach flying altitude. No more ‘in May next year this, in May next year that’ Our time has come. Given the amount of attention that the GDPR has received in recent times, data protection professionals are in high demand but we are ready.

GDPR 40
article thumbnail

Data breach notification to become mandatory in Australia from 22 February 2018

Data Protection Report

Privacy compliance will become even more important for all companies in Australia now that the mandatory data breach notification scheme has been enacted. From 22 February 2018, certain data breaches (known as “eligible data breaches”) will need to be notified to the Australian Privacy Commissioner and affected individuals. Previously, notification of data breaches was optional.

article thumbnail

Privacy and Cybersecurity Upcoming 2018 Events

HL Chronicle of Data Protection

Please join us for our Upcoming 2018 Privacy and Cybersecurity Events. February 1. Challenges for GDPR Implementation. Mark Brennan will moderate a panel on GDPR issues at the FCBA CLE: International Privacy: U.S. Perspectives on EU Privacy Frameworks. Location : Washington, D.C. February 21. Privacy, What Does That Look Like? Joke Bodewits will participate in a speaking engagement on accountability at the Institute for International Research on GDPR countdown congress.

Privacy 40
article thumbnail

Ticking Time Bombs in Your Data Center

Dark Reading

The biggest security problems inside your company may result from problems it inherited.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

14 leading tools for predictive analytics and machine learning

Information Management Resources

KNIME, RapidMiner, Dataiku and Statistica are among the top vendors offering products in these technology areas, according to Forrester Research.

article thumbnail

Court Denies Plaintiffs’ Request to Email All Defendant Employees as “Simply Unreasonable”: eDiscovery Case Law

eDiscovery Daily

In Firefighters’ Ret. Sys., et al. v. Citco Grp. Ltd., et al., No. 13-373-SDD-EWD (M.D. La. Jan. 3, 2018) , Louisiana Magistrate Judge Erin Wilder-Doomes denied the plaintiffs’ renewed motion to compel after the parties previously agreed upon search terms and document custodians, stating that the plaintiffs’ request to “email everyone in every Citco entity to ask whether anyone employed by any Citco entity has knowledge relevant to this litigation, and thereafter require the Citco Defendan

article thumbnail

Cisco Issues New Patch for Critical ASA Vulnerability

Dark Reading

Cisco engineers discover that the flaw in Adaptive Security Appliance devices is worse than they initially understood.