Wed.Jan 31, 2018

article thumbnail

What's Riding on 5G Security? The Internet of Everything

Data Breach Today

5G Brings Great Speed But Also Great Complexity The U.S. government's idea to take the reins of the development of 5G mobile networks has been met with cynicism and criticism. But there are goods reasons the government is worried: Standards haven't been set in stone yet, and 5G will present a bevy of new security challenges. Here are some of them.

Security 157
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Regardless of the security measures and efforts put in place, organizations need to act as if a successful cyberattack is not a question of “if” but “when.”. As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feel the Heat: Strava 'Big Data' Maps Sensitive Locations

Data Breach Today

Internet of Things Privacy Fallout, Now in Heat Map Form Fitness app and website developer Strava has landed in hot water after publishing a global heat map that shows users' workout routes in aggregate. By doing so, the firm has inadvertently revealed military installation layouts and other sensitive information.

Big data 153
article thumbnail

If Robert Mueller Is Fired, the Russia Probe Could Continue

WIRED Threat Level

The special counsel is under attack, but if Robert Mueller gets fired, the investigation into Trump’s Russia ties and obstruction of justice could keep going.

Security 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Venture Captalist Kellermann Gets 'Back on the Field'

Data Breach Today

After two years on the sidelines, watching what he calls the expansion of "cyber insurgency," Tom Kellermann declares himself "back on the field" as chief cybersecurity officer at Carbon Black. How have threats evolved, and what is his hands-on mission?

More Trending

article thumbnail

Kaspersky Lab's New Focus on Fraud Prevention

Data Breach Today

Emma Mohan-Satta of Kaspersky Lab on the New, Priority Threats and Solutions As the global threat landscape shifts, so does Kaspersky Lab. Moving from its traditional cybersecurity focus, Kaspersky now is honing in on fraud prevention. Emma Mohan-Satta describes this shift and what it means for security and anti-fraud leaders.

article thumbnail

'Jackpotting' ATM Hack Comes to the United States

WIRED Threat Level

The "jackpotting" ATM attack drained tens of millions of dollars worldwide before landing in the United States.

Security 104
article thumbnail

Artificial Intelligence: a new frontier to customer experience

OpenText Information Management

Facing heightened competition and increasing demands from customers, many organisations are now leveraging Artificial Intelligence (AI) to stay ahead of the curve. While the use of AI has predominantly been applied in heavy industries and financial services, it is now increasingly applied across a gamut of customer-facing industries, including retail and healthcare.

article thumbnail

Learn how to build your ladder to AI with "Machine Learning Everywhere"

IBM Big Data Hub

Join us 27 February at 1 PM ET for "Machine Learning Everywhere: Build Your Ladder to AI." Visit the event landing page to learn more about the event and register for a calendar reminder: ibm.com/mleverywhere.

74
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Getting off the legacy data hamster wheel

OpenText Information Management

“If you torture the data long enough, it will confess.” Wise words from Nobel award-winning Economist, Ronald Coase. Getting insights and intelligence from data is great, but many companies I speak with are on somewhat of a hamster wheel when it comes to the management of their data, particularly legacy data. Typically, this is because … The post Getting off the legacy data hamster wheel appeared first on OpenText Blogs.

IT 71
article thumbnail

I'm Teaming Up with Scott Helme to Run "Hack Yourself First" Workshops in Europe

Troy Hunt

This is probably the most self-explanatory blog post title I've ever written! But be that as it may, it deserves some explanation as to how I've arrived at this point and like many great ideas, it began over some beers. I've just arrived home to the Gold Coast in Australia which I frequently describe to people as "the sunny part of the sunny country" I'm literally sitting on a beach writing this blog post and frankly, I'd like to spend more time here.

IT 68
article thumbnail

Key factors in endpoint threat detection

OpenText Information Management

2017 was a year of massive data breaches – organizations like Equifax, Uber, Deloitte, Forever 21, OneLogin, Verizon, and Arby’s all made headline news. Even with technological advancements and wide adoption of perimeter-based protection platforms, organizations continued to fall victim to cyber criminals. That’s because while perimeter-based solutions are needed, they can never provide 100% … The post Key factors in endpoint threat detection appeared first on OpenText Blogs.

article thumbnail

Cybersecurity Pioneers: Discovering Government's Threat Hunters

Data Breach Today

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Records Storage: Pricing Out a Storage Project [Video]

Record Nations

Records storage might seem like the obvious answer to your document management needs but equally as important is understanding the costs associated with them. In the video below, you can discover the factors that influence a records storage service and if it is a viable option for your business. Video Transcription Records Storage: Pricing […].

IT 57
article thumbnail

Lazarus Group, Fancy Bear Most Active Threat Groups in 2017

Dark Reading

Lazarus, believed to operate out of North Korea, and Fancy Bear, believed to operate out of Russia, were most referenced threat actor groups in last year's cyberattacks.

51
article thumbnail

Google Booted 700,000 Bad Apps From Its Marketplace in 2017

Threatpost

In 2017 Google removed apps that violated the Google Play policies because they were malicious, purposely copied a more popular app or served up inappropriate content.

IT 49
article thumbnail

GSA to Upgrade Cybersecurity Requirements

Hunton Privacy

Recently, the General Services Administration (“GSA”) announced its plan to upgrade its cybersecurity requirements in an effort to build upon the Department of Defense’s new cybersecurity requirements, DFAR Section 252.204-7012 , that became effective on December 31, 2017. The first proposed rule, GSAR Case 2016-G511 “Information and Information Systems Security,” will require that federal contractors “protect the confidentiality, integrity and availability of unclassified GSA information and in

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Consumerization of Artificial Intelligence

Bill Schmarzo - Dell EMC

Consumerization is the design, marketing, and selling of products and services targeting the individual end consumer. Apple CEO Tim Cook recently promoted a $100-per-year iPhone app called Derm Expert. Derm Expert allows doctors to diagnose skin problems using only their iPhone. Doctors take a photo of a patient’s skin condition and then Derm Expert diagnoses the problem and prescribes treatment.

article thumbnail

UK Court of Appeal Rules DRIPA Inconsistent with EU Law

Hunton Privacy

On January 30, 2018, the UK Court of Appeal ruled that the Data Retention and Investigatory Powers Act (“DRIPA”) was inconsistent with EU law. The judgment, pertaining to the now-expired act, is relevant to current UK surveillance practices and is likely to result in major amendments to the Investigatory Powers Act (“IP Act”), the successor of DRIPA.

article thumbnail

Event Wrap-Up: 2018 Corporate E-Discovery Hero Awards by Zapproved

Hanzo Learning Center

Earlier this week, the Hanzo team partnered with Zapproved for the 2nd Annual Corporate E-discovery Hero Awards. The night was dedicated to eDiscovery innovators that are revolutionizing processes in the name of cost-effectiveness, efficiency and innovation. Check out our event wrap up below to learn more.

article thumbnail

Recap of NAGARA Winter Regional Forum 2018

The Texas Record

The National Association of Government Archives and Records Administrators (NAGARA) started a new initiative in 2017: organizing regional forums that provide live professional development opportunities to federal, state and local government employees around the country. Austin, Texas was lucky enough to land the winter regional forum this year, and on January 26, 78 attendees from across the state took advantage of this great opportunity.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Alaris Wins Prestigious 2018 Scanner Line of the Year Award from Buyers Lab an Unprecedented Third Consecutive Time

Info Source

January 24, 2018 – Fairfield, NJ – Keypoint Intelligence – Buyers Lab (BLI), the world’s leading independent tester of document imaging products, announced today that Alaris, a Kodak Alaris business, has been honored with the BLI 2018 Scanner Line of the Year award. BLI analysts bestow the coveted Line of the Year honor once annually to the vendor whose product line is determined to be the best overall, with models at every level that excel in BLI’s rigorous two-month laboratory evaluati

article thumbnail

IoT Botnets by the Numbers

Dark Reading

IoT devices are a botherder's dream attack-vector.

IoT 72
article thumbnail

Ephesoft Names Russ Hubbard as Chief Revenue Officer

Info Source

Irvine, Calif. – January 30, 2018 – Ephesoft, Inc., the leading developer of machine learning-based document capture and analytics solutions, today announced that it has appointed Russ Hubbard as Chief Revenue Office(CRO). He will architect and build the company’s sales strategy and operations to meet the growing global demand for Ephesoft’s technology, which turns unstructured content into actionable information.

article thumbnail

Multiple Critical Flaws Found in Zoho’s ManageEngine

Threatpost

Researchers have discovered critical vulnerabilities in Zoho’s ManageEnging suite that can lead to data loss and possible remote code execution.

Cloud 45
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A2iA Announces Russia as its Newest Market of Entry

Info Source

Paris, France and St. Petersburg, Russia, January 29, 2018 – A2iA (@A2iA), an award-winning developer of artificial intelligence and machine-learning based software for the worldwide data capture, document processing, and payment systems markets, today announced that Russia is its newest market of entry. The company officially opened a research and development subsidiary in St.

article thumbnail

700,000 Bad Apps Deleted from Google Play in 2017

Dark Reading

Google rejected 99% of apps with abusive content before anyone could install them, according to a 2017 security recap.

article thumbnail

Thursday LTNY 2018 Sessions: eDiscovery Trends

eDiscovery Daily

As noted yesterday and Tuesday , Legaltech® New York (LTNY) is happening this week and eDiscovery Daily is here to report about the latest eDiscovery trends being discussed at the show. This is the last day to check out the show if you’re in the New York area with a number of sessions available and over 200 exhibitors providing information on their products and services, including our company, CloudNine at booth #533.