Sun.Jul 15, 2018

article thumbnail

Cryptocurrency reality checks and the coming boom

Collaboration 2.0

Like the early stages of the dot com boom, the initial speculative crypto bubble is over. Expect waves of rapid evolution next, as maturity kicks in and serious players emerge and scale.

76
article thumbnail

Update CSE Malware ZLab – Operation Roman Holiday – Hunting the Russian APT28

Security Affairs

Researchers from the Z-Lab at CSE Cybsec analyzed a new collection of malware allegedly part of a new espionage campaign conducted by the APT28 group. It was a long weekend for the researchers from the Z-Lab at CSE Cybsec that completed the analysis a number of payloads being part of a new cyber espionage campaign conducted by the Russian APT28 group (aka Fancy Bear , Pawn Storm , Sednit , Sofacy, and Strontium ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Surge in hacked credit card information offered for sale on web

Information Management Resources

More than 4,000 credit cards per bank were on sale in the first half of 2018, up from about 2,400 in the second half of 2017, ccording to a new report.

Sales 36
article thumbnail

The Speed of Migration of Legal to the Cloud is Debatable: eDiscovery Trends

eDiscovery Daily

How fast is the legal industry moving to the cloud? And, what is holding some law firms back from migrating to the cloud? These and other questions were discussed in a recent online discussion among industry experts. In an article sponsored by ReplyAll on Bloomberg Law ( Live Conversation: Making Sense of Legal’s Migration (or Not) to the Cloud ), Zach Abramowitz moderated the discussion and introduced the topic as follows: “The migration of the legal industry to the cloud has been, much like

Cloud 31
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft urges lawmakers to regulate face recognition technology

Information Management Resources

For its part, the firm will take steps to make biometric systems less prone to bias and develop new public principles to govern the technology, says Brad Smith.

More Trending

article thumbnail

Bitcoin was Russian hackers' currency of choice, U.S. says

Information Management Resources

For years, bitcoin believers have tried to distance the digital coin from the perception that it's only used for criminal activity. New insights into Russian meddling in the U.S. election aren't helping.

IT 31
article thumbnail

Facebook hires a head of chip development from Google

Information Management Resources

The social-networking giant this month hired Shahriar Rabii to be a vice president and its head of silicon. The firm started forming a team to design chips earlier this year.

IT 30
article thumbnail

Broadcom tanks after $18.9B CA purchase puzzles market

Information Management Resources

The purchase represents a leap into a completely different area of electronics with no significant overlap with the semiconductor industry that CEO Hock Tan has so successfully reshaped.

article thumbnail

U.K. calls on EU to keep on sharing cyber security and data

Information Management Resources

Continuing to exchange such information after Brexit would ensure the U.K.’s departure from the EU won’t compromise either region’s ability to 'adapt to evolving threats,' a new report says.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Privacy.com seeks data-sharing middle ground through new API

Information Management Resources

The virtual card company is giving customers direct access to their data through an application programming interface to see what they do with it.

Access 28
article thumbnail

Cisco, Juniper fall on report Amazon may sell data switches

Information Management Resources

Cisco relies on hardware for more than half of its revenue, and switches and routers comprise the two biggest products in this space.

IT 29
article thumbnail

Email account hack at UMC Physicians puts data of 18,000 at risk

Information Management Resources

The organization reported that it is strengthening security protections in the aftermath of the breach.

Risk 30
article thumbnail

Automakers bristle at Trump Administration demand for sensitive data

Information Management Resources

A 34-page questionnaire from the U.S. Commerce Department was sent to several automakers this month, seeking sensitive details about company finances, factories, supply chains and other topics.

29
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.