Wed.Jan 09, 2019

article thumbnail

Is GDPR Compliance Tougher Than HIPAA Compliance?

Data Breach Today

Analysts: GDPR Case in Portugal Offers Lessons for U.S. Healthcare Entities An EU General Data Protection Regulation enforcement action against a hospital in Portugal demonstrates complying with GDPR may be even tougher than complying with HIPAA. Regulatory experts analyze the implications of the case.

GDPR 273
article thumbnail

Patch Tuesday, January 2019 Edition

Krebs on Security

Microsoft on Tuesday released updates to fix roughly four dozen security issues with its Windows operating systems and related software. All things considered, this first Patch Tuesday of 2019 is fairly mild, bereft as it is of any new Adobe Flash updates or zero-day exploits. But there are a few spicy bits to keep in mind. Read on for the gory details.

Security 154
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

German Police Identify Suspect Behind Massive Data Leak

Data Breach Today

Anger at Politicians and Public Figures Allegedly Motivated 20-Year-Old Suspect German police arrested a 20-year-old student - living at home with his parents - who they say confessed to leaking contact details and sensitive information for an estimated 1,000 German celebrities, journalists and politicians, including Chancellor Angela Merkel.

203
203
article thumbnail

Take Action on Data Privacy Day

AIIM

Data Privacy Day takes place annually on January 28th in recognition of the January 28, 1981 signing of Convention 108, the first legally binding international treaty concerning privacy and data protection. This day, led officially by The National Cyber Security Alliance (NCSA) , is an international effort to “create awareness about the importance of respecting privacy, safeguarding data, and enabling trust”.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Visual Journal: Black Hat Europe 2018

Data Breach Today

London Docklands Plays Host to 17th Annual Information Security Conference The recent Black Hat Europe conference in London touched on topics ranging from combating "deep fake" videos and information security career challenges to hands-on lock-picking tutorials and the dearth of research proposals centered on deception technology.

More Trending

article thumbnail

Looking to form Industry Insights VIP Group

AIIM

I am interested in forming a dedicated group of knowledgeable end users to provide insight on key trends in Intelligent Information Management. The intention is to systematically identify: The key drivers motivating potential customers. Buying intentions during the next 12-24 months. Obstacles faced during the acquisition and implementation process.

IT 80
article thumbnail

Web Vulnerabilities Up, IoT Flaws Down

Dark Reading

The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva.

IoT 83
article thumbnail

Government Shutdown Hampers Cybersecurity

Adam Levin

The ongoing shutdown of the U.S. Government has impacted federal cybersecurity according to several reports. The roughly 800,000 federal workers currently on furlough include: 45% of staff from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency , which is tasked with defending critical infrastructure from cyber and physical threats. 80% of the National Protection and Programs Directorate , which oversees the Office of Cyber and Infrastructure Analysis and the

article thumbnail

What makes a great CIAM platform?

OpenText Information Management

The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear around 2014, but today almost 50% of organizations say they have implemented the technology. As I noted in my previous blog, although CIAM is still relatively new it is rapidly becoming a ‘must have’ for any … The post What makes a great CIAM platform?

Access 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What is Apple Business Manager?

Jamf

Discover what Apple Business Manager is and why you should strongly consider using it to help make your everyday Apple device management tasks easier, faster and more simplified.

IT 75
article thumbnail

Microsoft January 2019 Patch Tuesday updates fix 7 critical vulnerabilities

Security Affairs

Microsoft has released the January 2019 Patch Tuesday updates that address 51 vulnerabilities in Windows OSs and other products. Microsoft has released Microsoft January 2019 Patch Tuesday that solve 51 vulnerabilities in Windows operating system and in the following solutions: Adobe Flash Player Internet Explorer Microsoft Edge Microsoft Windows Microsoft Office and Microsoft Office Services and Web Apps ChakraCore.NET Framework ASP.NET Microsoft Exchange Server Microsoft Visual Studio.

article thumbnail

ITIL 4: What you need to know about the 2019 ITIL update

IT Governance

A new version of ITIL ® (Information Technology Infrastructure Library ® ) is being released in the first quarter of 2019. ITIL 4 will build upon its existing framework and address the criticisms of its current iteration. How does ITIL work? ITIL has five volumes , each focusing on a different aspect of ITSM (IT service management): Service strategy: helps organisations understand their customers and how to develop and deliver IT services to meet their needs.

article thumbnail

First Google security patches for Android in 2019 fix a critical flaw

Security Affairs

Google released its security patches for Android in 2019 that addressed tens of vulnerabilities in the popular mobile OS. Google released the first batch of security patches for Android in 2019 that addressed tens of flaws, the most severe of them is the CVE-2018-9583 issue. The CVE-2018-9583 flaw is a critical remote code execution vulnerability affecting the System, it was included in the 2019-01-01 security patch level.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Security at the Speed of DevOps: Maturity, Orchestration, and Detection

Dark Reading

Container and microservices technologies, including the orchestrator Kubernetes, create an extraordinary opportunity to build infrastructure and applications that are secure by design.

article thumbnail

Securing 2019 with ISO 27001

IT Governance

The new year can be a transformative time, as we turn our back on the holiday period and resolve that January will be the start of a ‘new year, new me’. You might be in the gruelling second week of that healthy diet or Dry January right now, with the novelty of your resolutions wearing thin and realisation that simply saying that it’s a new you doesn’t necessarily make it true.

article thumbnail

Magecart Mayhem Continues in OXO Breach

Dark Reading

The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.

77
article thumbnail

Biometrics in 2019: Increased Security or New Attack Vector?

Threatpost

Should we pump the brakes on the roll out of biometric security to first consider whether we are creating new vulnerabilities?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

6 Ways to Beat Back BEC Attacks

Dark Reading

Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.

62
article thumbnail

10 top technology trends that will impact organizations in 2019

Information Management Resources

Machine learning, data-centricity, self-service BI and distributed ledger technology will be among the top technology trends driving innovation and digital transformation this year.

article thumbnail

EU Offering Bug Bounties on Critical Open-Source Software

Schneier on Security

The EU is offering "bug bounties on Free Software projects that the EU institutions rely on.". Slashdot thread.

76
article thumbnail

The Promise and Peril of 5G

Threatpost

As the hype at CES demonstrates, 5G is the newest and shiniest tech bauble out there: but security concerns loom.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

3D Printing Takes First Steps Into Serial Manufacturing Production

Synergis Software

[Editor’s note: Guest blogger Randall Newton continues his occasional series of articles on trends in engineering with this report from the recent FORMNEXT 3D printing conference in Germany.]. Automobile manufacturer Audi is using its A4 Limousine, a low-production model, as a proving ground for process innovation research. One large steel frame section of the A4 has always been difficult to manufacture, so the research team decided to try 3D printing.

article thumbnail

Kaspersky Lab Helped US Nab NSA Data Thief: Report

Dark Reading

But this new development unlikely to do much to clear government suspicions about security vendor's ties to Russian intelligence, analyst says.

article thumbnail

Google Play Boots 85 Malicious Adware Apps

Threatpost

Once downloaded, the fake apps hide themselves on the victim’s device and continue to show a full-screen ad every 15 minutes.

article thumbnail

Container Deployments Bring Security Woes at DevOps Speed

Dark Reading

Nearly half of all companies know that they're deploying containers with security flaws, according to a new survey.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

State attorneys general announced a $1.5 million settlement with Neiman Marcus

Security Affairs

Tens of state attorneys general announced a $1.5 million settlement with The Neiman Marcus Group over a 2013 data breach. Tens of attorneys general announced this week a $1.5 million settlement with The Neiman Marcus Group LLC over a data breach suffered by the company in 2013 and disclosed earlier 2014. 43 states and the District of Columbia were involved in the settlement.

article thumbnail

Cutting Through the Jargon of AI & ML: 5 Key Issues

Dark Reading

Ask the tough questions before you invest in artificial intelligence and machine learning technology. The security of your enterprise depends on it.

article thumbnail

CIPL Co-Hosts Workshop on GDPR and Scientific Health Research

Hunton Privacy

On October 22, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP co-hosted a workshop in Brussels on “Can GDPR Work for Health Scientific Research?” (the “Workshop”) with the European Federation of Pharmaceutical Industries and Associations (“EFPIA”) and the Future of Privacy Forum (“FPF”) to address the challenges raised by the EU General Data Protection Regulation (“GDPR”) in conducting scientific health research.

GDPR 54