Wed.Jan 09, 2019

Is GDPR Compliance Tougher Than HIPAA Compliance?

Data Breach Today

Analysts: GDPR Case in Portugal Offers Lessons for U.S. Healthcare Entities An EU General Data Protection Regulation enforcement action against a hospital in Portugal demonstrates complying with GDPR may be even tougher than complying with HIPAA.

Patch Tuesday, January 2019 Edition

Krebs on Security

Microsoft on Tuesday released updates to fix roughly four dozen security issues with its Windows operating systems and related software. All things considered, this first Patch Tuesday of 2019 is fairly mild, bereft as it is of any new Adobe Flash updates or zero-day exploits.

Tips 167

German Police Identify Suspect Behind Massive Data Leak

Data Breach Today

Data 194

Government Shutdown Hampers Cybersecurity

Adam Levin

The ongoing shutdown of the U.S. Government has impacted federal cybersecurity according to several reports.

Visual Journal: Black Hat Europe 2018

Data Breach Today

London Docklands Plays Host to 17th Annual Information Security Conference The recent Black Hat Europe conference in London touched on topics ranging from combating "deep fake" videos and information security career challenges to hands-on lock-picking tutorials and the dearth of research proposals centered on deception technology

EU Offering Bug Bounties on Critical Open-Source Software

Schneier on Security

The EU is offering "bug bounties on Free Software projects that the EU institutions rely on.". Slashdot thread. eu incentives opensource

86

More Trending

Marriott downgrades severity of 2018 data breach: 383 million customers affected

IT Governance

In November 2018, hotel giant Marriott disclosed a data breach affecting its Starwood chain, in which up to 500 million customers’ personal data was stolen. It has now completed its investigation into the incident and revised its estimate of affected customers to a slightly less disastrous 383 million. The majority of stolen records were names and contact details, but Marriott has confirmed that the crooks (who are allegedly part of a Chinese intel-gathering operation ) also stole 25.55

Web Vulnerabilities Up, IoT Flaws Down

Dark Reading

The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva

IoT 101

ITIL 4: What you need to know about the 2019 ITIL update

IT Governance

A new version of ITIL ® (Information Technology Infrastructure Library ® ) is being released in the first quarter of 2019. ITIL 4 will build upon its existing framework and address the criticisms of its current iteration. How does ITIL work?

First Google security patches for Android in 2019 fix a critical flaw

Security Affairs

Google released its security patches for Android in 2019 that addressed tens of vulnerabilities in the popular mobile OS. Google released the first batch of security patches for Android in 2019 that addressed tens of flaws, the most severe of them is the CVE-2018-9583 issue. The CVE-2018-9583 flaw is a critical remote code execution vulnerability affecting the System, it was included in the 2019-01-01 security patch level.

Risk 62

Securing 2019 with ISO 27001

IT Governance

The new year can be a transformative time, as we turn our back on the holiday period and resolve that January will be the start of a ‘new year, new me’.

Take Action on Data Privacy Day

AIIM

Data Privacy Day takes place annually on January 28th in recognition of the January 28, 1981 signing of Convention 108, the first legally binding international treaty concerning privacy and data protection. This day, led officially by The National Cyber Security Alliance (NCSA) , is an international effort to “create awareness about the importance of respecting privacy, safeguarding data, and enabling trust”. Here at AIIM we recognize the importance of this day and its message.

eBook 60

What is Big Data Analytics?

OpenText Information Management

The amount of data in the world continues to grow at an incredible rate. IDC suggests that, by 2025, there will be 163ZB (zettabytes) of data – up from 4.4ZB in 2013. This massive increase in data is both a challenge and an opportunity for businesses.

10 top technology trends that will impact organizations in 2019

Information Management Resources

Machine learning, data-centricity, self-service BI and distributed ledger technology will be among the top technology trends driving innovation and digital transformation this year. Artificial intelligence Machine learning Business intelligence Data science Cloud computing

Using OpenText Content Intelligence reports and dashboards to improve productivity and insight

OpenText Information Management

One of the biggest problems with technology solutions aimed at improving personal and process productivity is that the systems are not tailored enough to each end user’s role or task.

Blog 59

How to drive home the Importance of data security with company stakeholders

Information Management Resources

Without a proper appreciation for data security and all that it entails, you’ll find your business falling behind. But getting all of your employees and company stakeholders on board can prove to be a major challenge. Data security Cyber security Cyber attacks

What makes a great CIAM platform?

OpenText Information Management

The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear around 2014, but today almost 50% of organizations say they have implemented the technology.

Blog 55

Carriers Swore They'd Stop Selling Location Data. Will They Ever?

WIRED Threat Level

Months after Sprint, AT&T, T-Mobile, and Verizon promised to stop selling user location data, the practice continues. Security

Data 55

The most-read OpenText blogs of 2018

OpenText Information Management

As 2018 ends and the New Year begins, we’re reflecting on the most-read OpenText™ blogs of the year. From diversity in technology to moving above the cloud to enabling the intelligent and connected enterprise, here are the 10 stories that caught your attention in 2018.

Blog 55

Paul Manafort Is Bad at Basic Tech, From Passwords to PDFs

WIRED Threat Level

The former Trump campaign chair keeps getting in trouble thanks at least in part to subpar digital security. Security

MicroStrategy Announces Release of HyperIntelligence Analytics

Perficient Data & Analytics

In a whirlwind of activity that included an executive networking lunch and live webcast, Q&A chat hosted by CMO Marge Breya and a ceremonial ringing of the Nasdaq opening bell, MicroStrategy officially unveiled MicroStrategy 2019 on Monday. Touted as the industry’s first and only enterprise platform for HyperIntelligence, transformational mobility and federated analytics, MicroStrategy 2019 promises to be an innovative breakthrough in enterprise analytics.

A Growing Frontier for Terrorist Groups: Unsuspecting Chat Apps

WIRED Threat Level

Opinion: As Twitter, Facebook, and YouTube crack down on extremist propaganda, ISIS recruiters are exploiting lesser-known messenger apps. Security Opinion

What is Apple Business Manager?

Jamf

Discover what Apple Business Manager is and why you should strongly consider using it to help make your everyday Apple device management tasks easier, faster and more simplified

IT 74

Different Types of Security In Records Management

Record Nations

Security threats in records management come from all directions ranging from malware and data breaches to theft, fire, or flood, making it essential to incorporate multiple types of security in records management.

Data management, systems upgrades top priorities with rising IT budgets

Information Management Resources

IT spending is expected to rise for many organizations this year—including investments related to data management technologies—according to industry research. Hardware and software Data management Data strategy

MicroStrategy Announces Release of HyperIntelligence Analytics

Perficient Data & Analytics

In a whirlwind of activity that included an executive networking lunch and live webcast, Q&A chat hosted by CMO Marge Breya and a ceremonial ringing of the Nasdaq opening bell, MicroStrategy officially unveiled MicroStrategy 2019 on Monday. Touted as the industry’s first and only enterprise platform for HyperIntelligence, transformational mobility and federated analytics, MicroStrategy 2019 promises to be an innovative breakthrough in enterprise analytics.

Blockchain and GDPR: Not mutually exclusive but can be a toxic blend

Information Management Resources

Depending on who you listen to, the combination of GDPR and distributed ledger technology - DLT, aka blockchain - is either a poisonous cocktail or a magic potion. Blockchain GDPR Data management

Critical Flaw in Cisco’s Email Security Appliance Enables ‘Permanent DoS’

Threatpost

A remote attacker could exploit the vulnerability simply by sending an email. Vulnerabilities Web Security asyncos Cisco critical vulnerability Denial of Service dos attack email security appliance fix vulnerability

State attorneys general announced a $1.5 million settlement with Neiman Marcus

Security Affairs

Tens of state attorneys general announced a $1.5 million settlement with The Neiman Marcus Group over a 2013 data breach. Tens of attorneys general announced this week a $1.5 million settlement with The Neiman Marcus Group LLC over a data breach suffered by the company in 2013 and disclosed earlier 2014. 43 states and the District of Columbia were involved in the settlement.

2018 eDiscovery Case Law Year in Review, Part 4

eDiscovery Daily

As we noted Monday , Tuesday and yesterday , eDiscovery Daily published 65 posts related to eDiscovery case decisions and activities over the past year, covering 56 unique cases ! Yesterday, we looked back at cases related to sanctions and spoliation.

Magecart Mayhem Continues in OXO Breach

Dark Reading

The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period

Data 70

How AI and automation will impact cybersecurity strategies

Information Management Resources

Artificial intelligence will help move the sticks in security from remedial tasks to more extensive changes. Unfortunately, AI will also be used for bad purposes too. Data security Cyber security Cyber attacks

Container Deployments Bring Security Woes at DevOps Speed

Dark Reading

Nearly half of all companies know that they're deploying containers with security flaws, according to a new survey

3D Printing Takes First Steps Into Serial Manufacturing Production

Synergis Software

[Editor’s note: Guest blogger Randall Newton continues his occasional series of articles on trends in engineering with this report from the recent FORMNEXT 3D printing conference in Germany.]. Automobile manufacturer Audi is using its A4 Limousine, a low-production model, as a proving ground for process innovation research. One large steel frame section of the A4 has always been difficult to manufacture, so the research team decided to try 3D printing.