Thu.Apr 05, 2018

article thumbnail

Facebook: 87M Accounts May Have Been Sent To Cambridge Analytica

Data Breach Today

Social Networking Giant Also Says Malicious Actors Scraped Public Profiles Facebook says up to 87 million people may have had their personal details transferred to voter-profiling firm Cambridge Analytica. The figure includes 17 million people in nine countries outside the U.S., potentially intensifying regulator scrutiny of the social networking site.

179
179
article thumbnail

Mark Zuckerberg refuses to step down or fire staff over Facebook 'mistakes'

The Guardian Data Protection

Founder says he takes full responsibility for data breaches and will not ‘throw anyone else under the bus’ Mark Zuckerberg has rejected calls for heads to roll at Facebook over the Cambridge Analytica scandal, saying that he takes full responsibility. Speaking after Facebook’s fullest statement yet about the data breach, which the company now says resulted in 87m profiles being extracted from the platform, Zuckerberg insisted he remained the correct person to run the company.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Art Coviello on Fraud and the 2018 State of Security

Data Breach Today

RSA's Ex-CEO Opens up on Cybercrime and Social Media Risks Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.

article thumbnail

How modern RIM professionals are staying relevant – Part 3

TAB OnRecord

In parts one and two of this blog post we discussed the importance of records management professionals getting involved in the early stages of the information lifecycle, and the need to convey RIM principles in terms of business outcomes. The final segment of this three-part post covers the skills needed by RIM professionals to be [.] Read More. The post How modern RIM professionals are staying relevant – Part 3 appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NJ AG Smacks Practice With Hefty Fine for Vendor Breach

Data Breach Today

Settlement Spotlights Vendor Risks, Plus State Enforcement Trends The New Jersey state attorney general has smacked a medical practice with a $418,000 penalty for a 2016 HIPAA breach involving a vendor's misconfigured server. The case is the latest example of the risks posed by vendors.

Risk 113

More Trending

article thumbnail

The Challenge of Fighting Identity Fraud

Data Breach Today

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs Armed with stolen personal data, cybercriminals can easily bypass traditional identity authentication methods. So, how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insight.

article thumbnail

Our data is valuable. Here's how we can take that value back | Francesca Bria

The Guardian Data Protection

Silicon Valley’s surveillance capitalism isn’t working. But Barcelona shows that citizens’ data can generate public value Tech firms are emerging as new feudal lords. They control essential digital infrastructures – in this case, data and artificial intelligence – which are crucial for political and economic activity. But it doesn’t have to be that way.

article thumbnail

The Future of Secure Payments

Data Breach Today

Jim Cunha of the Boston Fed on Future-Proofing Against Fraud The Secure Payments Task Force was established by the Federal Reserve Bank in 2015 in part to determine areas of focus and priorities for future action. Jim Cunha, a member of that task force, talks about how to advance payment system safety, fight fraud and ensure resiliency.

Security 100
article thumbnail

A 200-Year-Old Idea Offers a New Way to Trace Stolen Bitcoins

WIRED Threat Level

Cambridge researchers point to an 1816 precedent that could fundamentally change how "dirty" Bitcoins are tracked.

Security 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Upcoming webinar: Business Continuity Management: How to get started

IT Governance

Cyber attacks, natural disasters, power failures, industrial action and human error: these risks all have the potential to severely disrupt business operations and are often unpredictable. A growing body of legislation and the current cyber threat landscape has made organisations even more aware of the risks of cyber attacks, and the importance of being able to effectively respond to and recover from a business disruption.

Risk 74
article thumbnail

How to Build a Cybersecurity Incident Response Plan

Dark Reading

Being hit by a cyberattack is going to be painful. But it can be less painful if you're prepared, and these best practices can help.

article thumbnail

Essential guidance to implementing an effective IT Governance system

IT Governance

The world is changing rapidly and cyber threats are becoming more frequent and severe. Most cyber attacks are automated and indiscriminate, exploiting known vulnerabilities rather than targeting specific organisations. While most organisations believe that their information security systems are secure, often the reality is that they are not. Faced with these increasing information security threats, organisations have an urgent need to adopt IT governance best practice strategies.

article thumbnail

Mark Zuckerberg: Facebook 'didn't do enough' – audio

The Guardian Data Protection

The Facebook founder has said in a conference call to reporters that his company 'didn't do enough' to prevent companies like Cambridge Analytica from abusing tools on the platform. Zuckerberg said he accepted this was his 'mistake' and that the company should have done more Mark Zuckerberg refuses to step down or fire staff over Facebook 'mistakes' Continue reading.

Privacy 51
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Our latest collaboration

OpenText Information Management

A little over a month ago, we announced the exciting news that Hightail was acquired by OpenText™, a global leader in Enterprise Information Management (EIM). This news opens many new doors for Hightail and our customers. What does it all mean? Over the past three years, since the release of Hightail’s creative collaboration features (Hightail … The post Our latest collaboration appeared first on OpenText Blogs.

IT 49
article thumbnail

Delta, Sears Breaches Blamed on Malware Attack Against a Third-Party Chat Service

Threatpost

Security experts say breaches impacting Delta Air Lines and Sears customers is tied to malware planted on a third-party chat service.

article thumbnail

Cryptomining: Fast-Becoming the Web's Most Profitable Attack Method

Dark Reading

The ROI of 'cryptojacking' has never been higher, making bitcoin and other cryptocurrencies a more attractive target for cybercriminals. Here's why.

50
article thumbnail

ISO 27001: How to set and document your information security objectives

IT Governance

As part of your ISO 27001 certification project, your organisation needs to prove its compliance with appropriate documentation. Having created an information security policy , risk assessment procedure and risk treatment plan , you will be ready to set and document your information security objectives. Make your objectives measurable. Clause 6.2 of ISO 27001 outlines the requirements organisations need to meet when creating information security objectives.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Unpatched Vulnerabilities the Source of Most Data Breaches

Dark Reading

New studies show how patching continues to dog most organizations - with real consequences.

article thumbnail

Rarog Trojan ‘Easy Entry’ For New Cryptomining Crooks, Report Warns

Threatpost

A malware family called Rarog is becoming an appealing and affordable entry point for hackers to run cryptocurrency mining campaigns, researchers say.

Mining 47
article thumbnail

Sears & Delta Airlines Are Latest Victims of Third-Party Security Breach

Dark Reading

An insecure ecosystem of third parties connected to an enterprise network poses a growing risk, security analysts say.

article thumbnail

New Preservica SaaS portfolio redefines affordability of digital preservation storage

Preservica

Extended Preservica range combines enterprise-grade active digital preservation with private cloud-hosting, a 100% data integrity guarantee and low-cost storage at AWS prices. Oxford, UK and Boston, MA: April 05 2018: Preservica has announced three new cloud-hosted active digital preservation and access solutions that build on the success of its Cloud Edition and redefine the affordability of preservation storage allowing customers to grow their archives with confidence.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Supply Chain Attacks Could Pose Biggest Threat to Healthcare

Dark Reading

Healthcare organizations often overlook the supply chain, which researchers say is their most vulnerable facet.

56
article thumbnail

A new era for digital preservation in the cloud

Preservica

For some years now, it has been possible for institutions who want to future-proof vital digital content to do so by choosing alternative deployment options: either, to set up their own internally-hosted digital preservation system, or subscribe to a cloud-based system (so called Software-as-a-Service, SaaS). Both choices have their advantages, and constraints.

article thumbnail

How Security Can Bridge the Chasm with Development

Dark Reading

Enhancing the relationships between security and engineering is crucial for improving software security. These six steps will bring your teams together.

article thumbnail

ELO Digital Office USA Announces HSS Barbados as New Partner

Info Source

Boston, MA – March 28, 2018 — ELO Digital Office USA , enabling businesses to improve collaboration and streamline information management in a digital economy, announced its expansion into the Caribbean market with the addition of HSS Barbados as an ELO Digital Office Certified Partner. HSS Barbados, headquartered in St. Michaels, is a full-service information technology provider serving small to large enterprises throughout the Caribbean region.

ECM 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Evans & Dixon readies for the future by streamlining their document management with OpenText eDOCS

OpenText Information Management

Is your document management solution scalable to your firm’s future growth? When Evans & Dixon decided to implement a document management system in their Midwest U.S. law firm, almost a decade ago, they knew they were in dire need of a software solution to bring them into this millennium. What Jeff Sheldon, CIO, also knew … The post Evans & Dixon readies for the future by streamlining their document management with OpenText eDOCS appeared first on OpenText Blogs.

article thumbnail

Webinar Wrap-Up: eDiscovery with the C-Suite

Hanzo Learning Center

The Hanzo team had the pleasure of hosting eDiscovery with the C-Suite , a webinar featuring Relativity CEO Andrew Sieja and Hanzo CEO Kevin Gibson. The leaders in eDiscovery technology focused on the changing digital landscape and the complications of addressing these changes with traditional eDiscovery. As technology continues to evolve at increasing speed, the two shared insight into the future of eDiscovery and how the enterprise is managing the move towards unstructured content.

40
article thumbnail

Mirai Variant Botnet Takes Aim at Financials

Dark Reading

In January, a botnet based on Mirai was used to attack at least three European financial institutions.

54