Thu.Mar 29, 2018

article thumbnail

Atlanta After Ransomware Attack: Please Restart Your PC

Data Breach Today

5 Days After Outbreak, Email Works, But Don't Try Paying Parking Tickets Online Five days after a ransomware outbreak crypto-locked city systems, Atlanta has advised its 8,000 employees that they can once again boot their PCs and printers. But information security experts warn that the city's infrastructure still appears to have easily exploitable misconfigurations.

article thumbnail

How modern RIM professionals are staying relevant – Part 2

TAB OnRecord

In a three-part blog post we are outlining the ways that modern RIM professionals are increasing the value they provide to the organization. In part one of our blost post we discussed how records managers are extending their reach beyond the filing and storage rooms. This allows them to apply their expertise in information architecture, [.] Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Boeing Confirms 'Limited' Malware Outbreak

Data Breach Today

WannaCry Reportedly Identified by Boeing Executive as the Culprit Boeing says that a malware outbreak affected a small number of systems but did not disrupt production. An executive has reportedly identified the malware as being WannaCry ransomware and called for "all hands on deck" to respond to the incident.

article thumbnail

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

The year was 1994 and I had the fortunate opportunity to stumble upon a company – Cygnus Support – that was “selling free software.” I remember telling my mom that I was Vice President of Sales & Marketing of a company that was selling free software. After a very long pause, she replied, “Is your resume up to date?”. Cygnus Support sold support contracts and custom consulting projects for GNU development tools (gcc, g++, gdb) to companies looking to accelerate their time-to-market in the emb

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

OCR Considering HIPAA Privacy Rule, Enforcement Changes

Data Breach Today

But Agency Will Seek Public Input First Federal regulators are considering potential changes to HIPAA privacy rule and enforcement regulations, but aim to first engage the healthcare sector and public for input, says the nation's top HIPAA enforcer. So, what changes are being considered?

Privacy 151

More Trending

article thumbnail

Julian Assange Gets Another Internet Timeout

Data Breach Today

WikiLeaks Founder Gets Internet Access Revoked For Meddling in Foreign Affairs Ecuador's embassy in London has again revoked internet access for seven-year houseguest Julian Assange, saying the WikiLeaks chief violated an agreement to not interfere in other countries' matters. WikiLeaks' star has continued to fall since it's been revealed to be an apparent Russian stooge.

Access 124
article thumbnail

Apple launches iOS 11.3 with raft of privacy features

The Guardian Data Protection

Sensing opportunity – and GDPR – the Silicon Valley company launches major data protection push across devices Apple is launching a major privacy push, with software updates across all its devices to introduce new data privacy information immediately, with an updated website offering new privacy management tools to follow in May. Thursday’s updates (macOS 10.13.4, iOS11.3 and tvOS 11.3) are prompted by the enormous new European data protection regulation GDPR, and have been in the works since at

Privacy 102
article thumbnail

Ransomware Payments: Where Have All the Bitcoins Gone?

Data Breach Today

Researchers Track Cryptocurrency Ransoms Paid by Cerber, Locky and Other Victims Ransomware isn't an easy area to study. But a team of researchers has calculated the minimum paid by all ransomware victims over a two-year period, and found that nearly 75 percent of the bitcoins attackers received got funneled onto Russia's now-shuttered BTC-e cryptocurrency exchange.

article thumbnail

Leveraging tokenization services from the major card brands

Thales Cloud Protection & Licensing

As the volume of both card-based payments and digital payments continue to grow significantly year-on-year, the importance of securing sensitive card data (and in particular the primary account number or PAN) has never been a more critical and challenging task. In the recent Thales eSecurity eBook, ‘ PCI Compliance and Data Protection for Dummies ’, we cover the main technologies that can be used, such as encryption and tokenization, to help with such efforts in protecting the payment prior to a

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GDPR: how can I email data securely to comply with the new regulations?

The Guardian Data Protection

Robert is often required to email sensitive data. Is there a secure way of doing so in view of the new data protection laws? As a freelance media professional, I am often asked by my various employers to send copies of my passport, completed visa forms and other sensitive data in the form of email attachments. I have recently questioned this and have not really got a satisfactory response.

GDPR 91
article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data from our posts, our likes, our photos , things we type and delete without posting, and things we do while not on Facebook and even when we're offline. It buys data about us from others. And it can infer even more: our sexual orientation, political beliefs, relationship status, drug use, and other personality traits -- even if we didn't

article thumbnail

Facebook to stop allowing data brokers such as Experian to target users

The Guardian Data Protection

Company to shut down Partner Categories feature to ‘improve people’s privacy’ but analysts question potential impact of change Facebook is shutting down a feature that allowed “data brokers” such as Experian and Oracle to use their own reams of consumer information to target social network users, the company has announced. The feature, known as “Partner Categories”, will be “winding down over the next six months”, Facebook announced in a terse blogpost.

Privacy 79
article thumbnail

Employees’ lack of security awareness is “inexplicable and inexcusable”

IT Governance

Organisations’ second biggest concern is their employees’ lack of security awareness, according to CyberEdge’s 2018 Cyberthreat Defense Report. This is the first time in five years that poor security awareness hasn’t topped the list – with ‘lack of skilled personnel’ nabbing the top spot. However, as CyberEdge notes, the gap between first and second position is so small that both should be considered a top priority.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Moving towards transparency – Implementing the EU Clinical Trials Regulation

OpenText Information Management

In a previous blog I looked at the EU adoption of the ISO Identification of Medicinal Products (IDMP). I mentioned then that Life Sciences companies needed to be aware of other legislation – such as the Clinical Trials Regulation – when planning to meet the new EU regulatory requirements. This changing regulatory environment is something … The post Moving towards transparency – Implementing the EU Clinical Trials Regulation appeared first on OpenText Blogs.

article thumbnail

CISMP training courses now available in Glasgow

IT Governance

Certificate in Information Security Management Principles (CISMP) is a foundation-level qualification that demonstrates good knowledge of information security management. High demand means we are now offering our CISMP training course in different locations, including Glasgow. The CISMP course is a great starting point for anyone looking to develop a career in information security as it provides a solid foundation upon which a successful information security career can be built.

article thumbnail

MuslimCrypt Steganography App Helps Jihadists Send Secret Messages

WIRED Threat Level

The unfortunately named MuslimCrypt uses steganography to pass discreet messages through images online.

article thumbnail

Another Branch Prediction Attack

Schneier on Security

When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction in microprocessors. Here's another one : In the new attack, an attacker primes the PHT and running branch instructions so that the PHT will always assume a particular branch is taken or not taken.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Facebook's Election Safeguards Are Still a Work in Progress

WIRED Threat Level

The social media giant Thursday outlined several attempts to help protect the midterm elections, but still has a long way to go.

article thumbnail

Does Your Browser Block Cryptojacking Attacks?

eSecurity Planet

Learn what you can do to limit the risk of in-browser cryptojacking attacks.

Risk 75
article thumbnail

Deconstructing the DOJ Iranian Hacking Indictment

Dark Reading

The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years.

48
article thumbnail

A Digital Transformation Lesson: Open Source Business Models

Bill Schmarzo - Dell EMC

The year was 1994 and I had the fortunate opportunity to stumble upon a company – Cygnus Support – that was “selling free software.” I remember telling my mom that I was Vice President of Sales & Marketing of a company that was selling free software. After a very long pause, she replied, “Is your resume up to date?”. Cygnus Support sold support contracts and custom consulting projects for GNU development tools (gcc, g++, gdb) to companies looking to accelerate their time-to-market in the emb

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

EUROPE: European Court Human Rights: Employer allowed to consult employee’s work computer files unless clearly identified as private

DLA Piper Privacy Matters

By Gert-Jan Fraeyman and Peter Craddock. On 22 February 2018, the European Court of Human Rights ( ECHR ) decided a case concerning the alleged violation of Article 8 of the European Convention on Human Rights (the Convention ) in the context of controlling an employee’s personal files stored on the hard drive of his work computer. The judgment of the ECHR (in French) can be accessed here and the press release (in English) can be accessed here.

article thumbnail

8 tips for a top data backup strategy

Information Management Resources

On the eve of World Backup Day, these IT security experts share their best practices for a safe and secure information protection plan.

article thumbnail

MITRE Evaluates Tools for APT Detection

Dark Reading

A new service from MITRE will evaluate products based on how well they detect advanced persistent threats.

52
article thumbnail

Drupal Issues Highly Critical Patch: Over 1M Sites Vulnerable

Threatpost

Drupal developers are urged to patch a bug that allows attackers to take over a site simply by visiting it.

IT 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Five Last-Minute GDPR Readiness Tips

eSecurity Planet

Time for complying with GDPR is quickly running out. Experts shine a spotlight on five critical aspects of ensuring GDPR compliance.

GDPR 45
article thumbnail

WannaCry Re-emerges at Boeing

Dark Reading

Computers at the aerospace giant were hit by the WannaCry malware but systems are back to normal

53
article thumbnail

Digital transformation strategies and tech investments often at odds

Information Management Resources

Many firms are investing in technology that they don’t feel confident using, including artificial intelligence, blockchain, and voice-activated or facial-recognition technologies.