Tue.Jan 16, 2018

article thumbnail

The Machine Identity Crisis

Data Breach Today

We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.

article thumbnail

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it.

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Healthcare Ready to Comply With GDPR?

Data Breach Today

This edition of the ISMG Security Report takes a look at how ready healthcare organizations are for GDPR compliance. Also featured: comments from Alberto Yepez of Trident Capital on the 2018 outlook for information security companies and a summary of the latest financial fraud trends.

GDPR 147
article thumbnail

The Astrophysicist Who Wants to Help Solve Baltimore's Urban Blight

WIRED Threat Level

Vacant buildings are more than just an economic threat. They're also a public safety concern. And it turns out they have their own sort of gravitational pull.

IT 103
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

LeakedSource Operator Busted by Canadian Police

Data Breach Today

Canadian Charged With Selling Access to Stolen Logins, Earning $247,000 Canadian police have charged a 27-year-old man with running LeakedSource, which sold access to 3.1 billion stolen login credentials. Jordan Evan Bloom is accused of making $247,000 by administering the site, which offered a subscription service.

Access 113

More Trending

article thumbnail

NotPetya: From Russian Intelligence, With Love

Data Breach Today

CIA Reportedly Believes Russian Military Launched Wiper Disguised as Ransomware The CIA has attributed last year's outbreak of NotPetya wiper malware to Russia's GRU military intelligence unit, The Washington Post reports. Other intelligence agencies and information security experts have reached similar conclusions, warning that Russia's hybrid warfare campaigns are intensifying.

Military 113
article thumbnail

The real costs of a data breach

IT Governance

According to Ponemon Institute’s 2017 Cost of Data Breach Study: United Kingdom , data breaches cost UK organisations an average of £2.48 million. When a data breach hits the headlines, we immediately think of the fine that the breached organisation may receive. However, there are a number of other costs associated with a data breach that aren’t just financial.

article thumbnail

What Makes ONC's 'Trusted Exchange Framework' So Complex?

Data Breach Today

Federal regulator's recently issued draft for a "trusted exchange framework" aimed at propelling nationwide, secure, interoperable, query-based health data exchange is a complex proposal that requires careful analysis, says David Kibbe, M.D., CEO of DirectTrust.

Security 100
article thumbnail

Improving CX is not a one-time effort

OpenText Information Management

Welcome to 2018! I trust that you’ve all updated your gym membership, started your diet and sworn off all those bad habits. If only it were a one-time effort – one set of reps, one pill, one technique. But sadly, it is not that easy. To help me prepare for my personal workout goals this … The post Improving CX is not a one-time effort appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hybrid use cases to dominate machine learning in 2018, part 1

IBM Big Data Hub

Big Data and Analytics Hub spoke with IBM Distinguished Engineer John Thomas (@johnjaithomas) about some of the importance of focusing on information architecture to make algorithms meet enterprise needs, as well as how machine learning can most effectively be applied in hybrid scenarios in 2018.

article thumbnail

Four Malicious Google Chrome Extensions Affect 500K Users

Dark Reading

ICEBRG Security Research team's finding highlights an often-overlooked threat.

article thumbnail

Oil Search lowers cost of ownership, boosts agility with OpenText Documentum as a Service

OpenText Information Management

As enterprises determine their digital strategy, they need to consider several factors including the benefits of moving applications to the cloud. How does utilizing cloud services challenge old operational approaches and create greater agility, flexibility and cost savings? Oil Search, the largest oil and gas company in Papua New Guinea, conducted a thorough investigation comparing … The post Oil Search lowers cost of ownership, boosts agility with OpenText Documentum as a Service appeare

Cloud 56
article thumbnail

Just Eat driver 'sent unwanted messages' to female customer

The Guardian Data Protection

Takeaway app criticised for response to woman who complained about inappropriate messages The Information Commissioner’s Office is investigating allegations that a delivery driver used a customer’s mobile number to send her inappropriate messages after dropping off the food she had ordered via the takeaway app Just Eat. The firm was criticised over its response to the complaint from Michelle Midwinter, who said she received a series of late-night messages from the driver, saying he was “a fan” a

Privacy 50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Lenovo Patches Networking OS Vulnerability Dating Back to 2004

Threatpost

A bug in Lenovo’s Enterprise Networking Operating System could allow an attacker to launch an authentication bypass attack.

article thumbnail

Advantages of pair programming in software development

Information Management Resources

From the individual perspective, it is initially very disruptive and mentally exhausting. But this methodology can quickly lead to greater shared accomplishments and 'Ah-hah' moments.

IT 53
article thumbnail

Top 3 Pitfalls of Securing the Decentralized Enterprise

Dark Reading

Doubling down on outdated security practices while the number of users leveraging your enterprise network grows is a race to the bottom for businesses moving to distributed workflows.

article thumbnail

Majority of IT workloads moving from data centers to the cloud

Information Management Resources

Driving this transition will be the growing number of Internet of Things devices and the rapid maturation of artificial intelligence and machine learning technologies.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Jim Risen Writes about Reporting Government Secrets

Schneier on Security

Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets.

article thumbnail

How RFID Can Help You Manage Your Data Center

RFID Global Solution, Inc.

Today’s Data Centers are facing many challenges. As facilities grow, the ability to manage inventory, asset utilization and power consumption becomes increasingly difficult. Frequent reconfigurations and consolidations create a loss of inventory visibility. Co-located assets may require utilizing multiple management systems and procedures. Sarbanes-Oxley accounting procedures mandate that a verifiable record of all assets be maintained.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Two: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great.

article thumbnail

Google Chrome Once Again Target of Malicious Extensions

Threatpost

Researchers at ICEBRG found four malicious extensions in the official Google Chrome store that affected more than 500,000 users.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Doh!!! The 10 Most Overlooked Security Tasks

Dark Reading

Here's a list of gotchas that often slip past overburdened security pros.

article thumbnail

Technologies that will drive digital transformation in 2018

Information Management Resources

Artificial intelligence, machine learning, blockchain and the Internet of Things will all help orrganizations gain competitive advantage.

article thumbnail

In Security & Life, Busy Is Not a Badge of Honor

Dark Reading

All security teams are busy, but not all security teams are productive. The difference between the two is huge.

article thumbnail

Alibaba's AI outgunned humans in key Stanford reading test

Information Management Resources

The model developed by the firm's Institute of Data Science of Technologies scored 82.44, edging past the 82.304 that rival humans achieved.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Most Common Exploits of 2017 in Microsoft Office, Windows

Dark Reading

The most common exploit affects Microsoft Office and has been used by attackers in North Korea, China, and Iran.

47
article thumbnail

Qualcomm vows value creation to counter hostile Broadcom bid

Information Management Resources

The firm has begun its public defense against the $105 billion hostile takeover attempt, asking shareholders to have confidence in management’s strategy and to push aside the suitor.

IT 29
article thumbnail

Kaspersky Lab Warns of Extremely Sophisticated Android Spyware Tool

Dark Reading

Skygofree appears to have been developed for lawful intercept, offensive surveillance purposes.

51