Wed.Jan 09, 2019

Is GDPR Compliance Tougher Than HIPAA Compliance?

Data Breach Today

Analysts: GDPR Case in Portugal Offers Lessons for U.S. Healthcare Entities An EU General Data Protection Regulation enforcement action against a hospital in Portugal demonstrates complying with GDPR may be even tougher than complying with HIPAA.

Patch Tuesday, January 2019 Edition

Krebs on Security

Microsoft on Tuesday released updates to fix roughly four dozen security issues with its Windows operating systems and related software. All things considered, this first Patch Tuesday of 2019 is fairly mild, bereft as it is of any new Adobe Flash updates or zero-day exploits.

Tips 172

German Police Identify Suspect Behind Massive Data Leak

Data Breach Today

Data 214

Government Shutdown Hampers Cybersecurity

Adam Levin

The ongoing shutdown of the U.S. Government has impacted federal cybersecurity according to several reports.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Visual Journal: Black Hat Europe 2018

Data Breach Today

London Docklands Plays Host to 17th Annual Information Security Conference The recent Black Hat Europe conference in London touched on topics ranging from combating "deep fake" videos and information security career challenges to hands-on lock-picking tutorials and the dearth of research proposals centered on deception technology

More Trending

EU Offering Bug Bounties on Critical Open-Source Software

Schneier on Security

The EU is offering "bug bounties on Free Software projects that the EU institutions rely on.". Slashdot thread. eu incentives opensource

82

What makes a great CIAM platform?

OpenText Information Management

The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear around 2014, but today almost 50% of organizations say they have implemented the technology.

Blog 79

Marriott downgrades severity of 2018 data breach: 383 million customers affected

IT Governance

In November 2018, hotel giant Marriott disclosed a data breach affecting its Starwood chain, in which up to 500 million customers’ personal data was stolen. It has now completed its investigation into the incident and revised its estimate of affected customers to a slightly less disastrous 383 million. The majority of stolen records were names and contact details, but Marriott has confirmed that the crooks (who are allegedly part of a Chinese intel-gathering operation ) also stole 25.55

First Google security patches for Android in 2019 fix a critical flaw

Security Affairs

Google released its security patches for Android in 2019 that addressed tens of vulnerabilities in the popular mobile OS. Google released the first batch of security patches for Android in 2019 that addressed tens of flaws, the most severe of them is the CVE-2018-9583 issue. The CVE-2018-9583 flaw is a critical remote code execution vulnerability affecting the System, it was included in the 2019-01-01 security patch level.

Risk 62

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

ITIL 4: What you need to know about the 2019 ITIL update

IT Governance

A new version of ITIL ® (Information Technology Infrastructure Library ® ) is being released in the first quarter of 2019. ITIL 4 will build upon its existing framework and address the criticisms of its current iteration. How does ITIL work?

Paul Manafort Is Bad at Basic Tech, From Passwords to PDFs

WIRED Threat Level

The former Trump campaign chair keeps getting in trouble thanks at least in part to subpar digital security. Security

Securing 2019 with ISO 27001

IT Governance

The new year can be a transformative time, as we turn our back on the holiday period and resolve that January will be the start of a ‘new year, new me’.

Web Vulnerabilities Up, IoT Flaws Down

Dark Reading

The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Using OpenText Content Intelligence reports and dashboards to improve productivity and insight

OpenText Information Management

One of the biggest problems with technology solutions aimed at improving personal and process productivity is that the systems are not tailored enough to each end user’s role or task.

Blog 60

10 top technology trends that will impact organizations in 2019

Information Management Resources

Machine learning, data-centricity, self-service BI and distributed ledger technology will be among the top technology trends driving innovation and digital transformation this year. Artificial intelligence Machine learning Business intelligence Data science Cloud computing

What is Big Data Analytics?

OpenText Information Management

The amount of data in the world continues to grow at an incredible rate. IDC suggests that, by 2025, there will be 163ZB (zettabytes) of data – up from 4.4ZB in 2013. This massive increase in data is both a challenge and an opportunity for businesses.

How to drive home the Importance of data security with company stakeholders

Information Management Resources

Without a proper appreciation for data security and all that it entails, you’ll find your business falling behind. But getting all of your employees and company stakeholders on board can prove to be a major challenge. Data security Cyber security Cyber attacks

The most-read OpenText blogs of 2018

OpenText Information Management

As 2018 ends and the New Year begins, we’re reflecting on the most-read OpenText™ blogs of the year. From diversity in technology to moving above the cloud to enabling the intelligent and connected enterprise, here are the 10 stories that caught your attention in 2018.

Blog 56

Most LGBTQ are Cyberbullied. Here’s How to Stay Safe Online

IG Guru

by Sarah Turner @ VPN Mentor We at vpnMentor conducted a survey in which we asked 695 LGBTQ+ people worldwide about their experiences online as they relate to their sexual orientation and gender identity.

Take Action on Data Privacy Day

AIIM

Data Privacy Day takes place annually on January 28th in recognition of the January 28, 1981 signing of Convention 108, the first legally binding international treaty concerning privacy and data protection. This day, led officially by The National Cyber Security Alliance (NCSA) , is an international effort to “create awareness about the importance of respecting privacy, safeguarding data, and enabling trust”. Here at AIIM we recognize the importance of this day and its message.

eBook 56

Carriers Swore They'd Stop Selling Location Data. Will They Ever?

WIRED Threat Level

Months after Sprint, AT&T, T-Mobile, and Verizon promised to stop selling user location data, the practice continues. Security

Data 54

Critical Flaw in Cisco’s Email Security Appliance Enables ‘Permanent DoS’

Threatpost

A remote attacker could exploit the vulnerability simply by sending an email. Vulnerabilities Web Security asyncos Cisco critical vulnerability Denial of Service dos attack email security appliance fix vulnerability

A Growing Frontier for Terrorist Groups: Unsuspecting Chat Apps

WIRED Threat Level

Opinion: As Twitter, Facebook, and YouTube crack down on extremist propaganda, ISIS recruiters are exploiting lesser-known messenger apps. Security Opinion

MicroStrategy Announces Release of HyperIntelligence Analytics

Perficient Data & Analytics

In a whirlwind of activity that included an executive networking lunch and live webcast, Q&A chat hosted by CMO Marge Breya and a ceremonial ringing of the Nasdaq opening bell, MicroStrategy officially unveiled MicroStrategy 2019 on Monday. Touted as the industry’s first and only enterprise platform for HyperIntelligence, transformational mobility and federated analytics, MicroStrategy 2019 promises to be an innovative breakthrough in enterprise analytics.

Different Types of Security In Records Management

Record Nations

Security threats in records management come from all directions ranging from malware and data breaches to theft, fire, or flood, making it essential to incorporate multiple types of security in records management.

P3iD Technologies launches Integration Services for Fujitsu NX Manager

Document Imaging Report

San Jose, California (January 9, 2019) – P3iD Technologies, a developer and integrator of highly secure document & data platforms for capture, extraction and storage, today announced its first service offering.

Demo 52

Data management, systems upgrades top priorities with rising IT budgets

Information Management Resources

IT spending is expected to rise for many organizations this year—including investments related to data management technologies—according to industry research. Hardware and software Data management Data strategy

State attorneys general announced a $1.5 million settlement with Neiman Marcus

Security Affairs

Tens of state attorneys general announced a $1.5 million settlement with The Neiman Marcus Group over a 2013 data breach. Tens of attorneys general announced this week a $1.5 million settlement with The Neiman Marcus Group LLC over a data breach suffered by the company in 2013 and disclosed earlier 2014. 43 states and the District of Columbia were involved in the settlement.

Blockchain and GDPR: Not mutually exclusive but can be a toxic blend

Information Management Resources

Depending on who you listen to, the combination of GDPR and distributed ledger technology - DLT, aka blockchain - is either a poisonous cocktail or a magic potion. Blockchain GDPR Data management

The Promise and Peril of 5G

Threatpost

As the hype at CES demonstrates, 5G is the newest and shiniest tech bauble out there: but security concerns loom. IoT Mobile Security 5G business models ces 2019 consumer electronics show cyber hyperconnectivity network slicing next generation wireless Security security concerns

IoT 69

How AI and automation will impact cybersecurity strategies

Information Management Resources

Artificial intelligence will help move the sticks in security from remedial tasks to more extensive changes. Unfortunately, AI will also be used for bad purposes too. Data security Cyber security Cyber attacks