Tue.Jan 09, 2018

article thumbnail

Toymaker VTech Settles FTC Privacy Lawsuit For $650,000

Data Breach Today

Message From FTC to Toymakers: Don't Mess With Kids' Privacy One of the most alarming breaches of 2015, involving Hong Kong toymaker VTech, has resulted in a $650,000 settlement with the U.S. Federal Trade Commission. It's a warning that internet of things security shortcomings - especially involving children's personal data - will have business consequences.

Privacy 169
article thumbnail

Steven Clark AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Steven Clark. Email steven_f_clark@raytheon.com. LinkedIn Profile [link]. Job Title Company Record Manager. Company Raytheon. Please provide one or two points that you will mention during your session Content analytics can be used to your advantage but it does take time and dedication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meltdown and Spectre Forecast: Patch Now and Keep Patching

Data Breach Today

Activate Available Browser Defenses Without Delay, Security Experts Warn Patch or perish to protect against Meltdown and Spectre attacks, and prepare to keep patching as Intel, AMD and ARM, as well as makers of devices running Apple, Google and Windows operating systems, including Apple iOS and Android smartphones and tablets, continue to refine their fixes.

Security 168
article thumbnail

How the Government Hides Secret Surveillance Programs

WIRED Threat Level

A new report from Human Rights Watch sheds light on a troubling law enforcement practice called “parallel construction.”.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Pauses Windows Security Updates to AMD Devices

Data Breach Today

Security Update Leaves Some Devices Unbootable; Microsoft Blames AMD Microsoft has paused issuing security updates to some Windows PCs with AMD chipsets after at least one update - meant to add some Meltdown and Spectre mitigations - has left some systems unbootable. Microsoft blamed the problem on AMD failing to properly document its firmware.

Security 167

More Trending

article thumbnail

Aadhaar Security: How Can It Be Fixed?

Data Breach Today

Security Critics Discuss the Gaps in the System After news of yet another apparent Aadhaar-related data breach, some security experts are once again calling for the government to substantially beef up security for the identification system.

Security 127
article thumbnail

Around the world with OpenText

OpenText Information Management

From Brazil to Ireland to Canada, Cacio Neto has had an exciting journey with OpenText. In this Careers & Culture blog, Cacio describes his experience to date: I joined OpenText in my home country of Brazil four years ago. I was the first SAP Professional Services Consultant in South America for Vendor Invoice Management (VIM). … The post Around the world with OpenText appeared first on OpenText Blogs.

75
article thumbnail

New Areas Ripe for Exploitation in 2018

Data Breach Today

Dave DeWalt, former CEO of McAfee and FireEye, identifies the next generation of cybersecurity threats in the latest edition of the ISMG Security Report. Also featured: an analysis of the recent news of the Meltdown and Spectre microprocessor flaws and the POS malware attack on retailer Forever 21.

Retail 127
article thumbnail

Internet of Toys Enforcement: VTech Agrees to COPPA Settlement

Data Matters

On January 8, the FTC announced a settlement with VTech (a maker of electronic children’s toys) for violations of COPPA, adding to the regulatory activity mounting in the last few years around the Internet of Toys. The company agreed to pay $650,000 to settle allegations that its Kid Connect app and its Learning Lodge platform collected personal information from almost 3,000,000 children without providing direct notice and obtaining their parent or guardian’s consent. .

Privacy 60
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A Conversation with Dave DeWalt: Part 1

Data Breach Today

It's been nearly one year since Dave DeWalt walked away from FireEye, where he served as CEO. The veteran security leader has a new role and some candid insights on the state of enterprise cybersecurity defenses.

article thumbnail

What you need to know about data flow mapping under the GDPR

IT Governance

With the new EU General Data Protection Regulation (GDPR) coming into effect in less than six months, it is vital that all organisations make sure they have accurate data flow maps. As part of a GDPR compliance project, organisations will have to map their data and information flows, which will allow them to assess their privacy risks. This is also the first step for completing a data protection impact assessment (DPIA) , which helps organisations to identify, assess and reduce privacy risks.

GDPR 66
article thumbnail

GDPR: What U.S. Healthcare Entities Need to Know

Data Breach Today

Under what circumstances must a U.S. healthcare provider comply with the European Union's General Data Protection Regulation, which will be enforced beginning in May? In an in-depth interview, regulatory attorney Stephen Wu explains the conditions under which compliance is required.

GDPR 113
article thumbnail

Extending the value of content webinar

OpenText Information Management

Scaling digital transformation for, broader adoption is a critical journey faced by every enterprise. By providing a secure and compliant foothold to easier access and sharing of information, Enterprise Content Management users can reach for the right document, at the right time, improving user adoption across the enterprise. Register for the OTLive webinar, February 13, … The post Extending the value of content webinar appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacked and hacked off: without change this new data law will fail victims | Alex Neill

The Guardian Data Protection

The data protection bill must be amended so independent organisations acting in the public interest can help consumers to get proper redress • Alex Neill is managing director of home products and services at Which? Your name, your email address, your home address, your bank details, your credit or debit card details. You probably cannot count the number of times that you have been asked to share these important pieces of personal data with a company or organisation in the past weeks or months.

article thumbnail

Essential guidance to prevent business continuity disasters

IT Governance

A range of internal and external risks could negatively impact your organisation and interfere with the normal running of your business. It is critical that your organisation understands and effectively prepares for these risks to ensure its survival. The importance of business continuity planning. Business continuity is a form of risk management that deals with the risk of business activities or processes being interrupted by external factors.

Risk 63
article thumbnail

Five Life Sciences trends in 2018

OpenText Information Management

It’s that time again when we all take to our crystal ball to predict what’s going to happen in the year ahead. I’m going to cheat a little by covering not what might happen, but what’s already happening that will have even greater impact in 2018. So, this blog looks at five 5 major Life … The post Five Life Sciences trends in 2018 appeared first on OpenText Blogs.

article thumbnail

Microsoft: How the Threat Landscape Will Shift This Year

Dark Reading

Exclusive interview with Windows Security lead on how 2017 was a "return to retro" security threats and 2018 will bring increasingly targeted, advanced, and dangerous cyberattacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Comply with GDPR

eSecurity Planet

IT experts share some their tips on updating IT systems and business processes to comply with the EU's strict new data privacy regulations.

GDPR 67
article thumbnail

20 Cybersecurity Vendors Getting Venture Capital Love

Dark Reading

VCs splashed a record $4B in funding in the cybersecurity pool - here are some highlights among the early- to middle-stage startups who snagged big deals last year.

article thumbnail

NSA Morale

Schneier on Security

The Washington Post is reporting that poor morale at the NSA is causing a significant talent shortage. A November New York Times article said much the same thing. The articles point to many factors: the recent reorganization , low pay, and the various leaks. I have been saying for a while that the Shadow Brokers leaks have been much more damaging to the NSA -- both to morale and operating capabilities -- than Edward Snowden.

55
article thumbnail

The unexpected benefits of ISO 27001

IT Governance

‘What are the benefits of ISO 27001?’ – If you type this question into Google, you are likely to get a dozen of search results which list the benefits of complying with the international information security standard, ISO 27001. I suppose that the people searching for the benefits of ISO 27001 are those who have the challenge of convincing their management to fund the implementation of an information security management system (ISMS).

Paper 53
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Turla Cyberespionage Gang Employs Adobe Flash Installer

Dark Reading

In recent data theft campaigns, the APT group has been downloading malware from what appears to be legitimate Adobe URLs and IP addresses, ESET says.

53
article thumbnail

Daniel Miessler on My Writings about IoT Security

Schneier on Security

Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects like houses and cars and locks to the internet, how bad things can get, and I know it's fun to be invited to talk about how everything is doom and gloom. I absolutely respect Bruce Schneier a lot for what he's contributed to InfoSec, which makes me that much more disappointed with this kind of position from him.

IoT 47
article thumbnail

Microsoft Confirms Windows Performance Hits with Meltdown, Spectre Patches

Dark Reading

Windows servers will see biggest degradation, as will Windows 7 and 8 client machines, Microsoft said.

64
article thumbnail

Anti-Virus Updates Required Ahead of Microsoft’s Meltdown, Spectre Patches

Threatpost

Microsoft is pausing the rollout of Windows Meltdown and Spectre patches until hosted anti-virus software vendors confirms no unsupported Windows kernel calls via the addition of a registry key on PCs.

Privacy 44
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

'Tis the Season: Dark Reading Caption Contest Winners

Dark Reading

Bricked devices, penetration tests, and virtual reality were among the themes submitted in our latest holiday caption competition. And the winners are.

45
article thumbnail

The hidden data organizations don’t realize is vulnerable to hackers

Information Management Resources

A key step in thwarting a cyberattack is understanding what information and technology are most at risk but might otherwise be overlooked.

Risk 53
article thumbnail

Microsoft Patches Exploited Office Bug

Dark Reading

An Office memory corruption vulnerability is the only CVE reported as under active attack for this month's Patch Tuesday.

51