Thu.Feb 08, 2018

article thumbnail

Feds Dismantle Ukrainian's $530 Million Carding Empire

Data Breach Today

'In Fraud We Trust' Was International 'Infraud Organization' Slogan The U.S. Department of Justice, in one of its biggest-ever cybercrime disruptions, shuttered the Infraud Organization, an online forum prosecutors tied to $530 million in losses. Thirteen suspects - in Australia, France, Italy, Kosovo, Serbia, the U.K. and the U.S. - have been arrested.

IT 174
article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. But they rightly have concerns. As the report notes: The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uber: 'No Justification' for Breach Cover-Up

Data Breach Today

CISO Says Characterizing Payoff as Bug Bounty Was Wrong Uber CISO John Flynn tells a U.S. Senate subcommittee that the company should have told the public sooner about its 2016 data breach. He says the company's attempt to position its $100,000 payoff to hackers as a bug bounty was not appropriate.

article thumbnail

City & County of Denver: How to redesign a document-intensive business process – Part 1

TAB OnRecord

When Colorado approved the retail sale of marijuana in 2013, the City & County of Denver was hit with a massive influx of applications from hopeful retailers. The licensing department was soon swamped with a backlog of unprocessed applications. In a two-part blog post we show how they dealt with the backlog and redesigned their [.] Read More. The post City & County of Denver: How to redesign a document-intensive business process – Part 1 appeared first on TAB Records Management Blog | T

Retail 74
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hospital Hit With Cryptocurrency Mining Malware

Data Breach Today

Are More Healthcare Sector Entities at Risk? Do healthcare entities face a growing risk of being hit with cryptocurrency mining attacks, which have become more common in other sectors? A Tennessee hospital may be the first victim in the sector, and some security experts predict many more such incidents.

Mining 150

More Trending

article thumbnail

Partners HealthCare Breach: Why So Long to Confirm?

Data Breach Today

Malware Incident Took Months to Investigate A malware incident at Partners HealthCare that was detected last spring but was only recently determined to have exposed patient data illustrates that confirming a data breach through a forensics investigation can be difficult and time-consuming.

article thumbnail

Weekly podcast: Grammarly, Infraud and Octoly

IT Governance

This week, we discuss breaches at Grammarly and Octoly, and the arrest of leading members of the Infraud cyber crime group. Hello and welcome to the IT Governance podcast for Friday, 9 February 2018. Here are this week’s stories. Last Friday, Tavis Ormandy of Google’s Project Zero discovered what he called a “high severity bug” affecting the users of the popular spelling and grammar checker Grammarly.

article thumbnail

Bridging the Password Gap

Data Breach Today

Rachael Stockton of LastPass says that 81 percent of breaches are caused by weak or reused passwords. So, is it time to take a hard look at password management and consider adding some technology to the practice?

Passwords 113
article thumbnail

Is mobile first government the way forward in 2018?

OpenText Information Management

In my previous blog I identified mobility as one of the key tech trends for government in 2018. The concept of a mobile first government IT strategy has been around for some years now but government agencies have been slow to adopt. Now, with the explosive growth of smartphones, the public sector must place much greater emphasis … The post Is mobile first government the way forward in 2018?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Guardian view on internet privacy: it’s the psychology, stupid | Editorial

The Guardian Data Protection

The ease with which giant databases can be queried and cross-referenced makes privacy vanish on the internet Privacy is necessary for human society to function. The problem is not that the information exists but that it reaches the wrong people. Information on the internet could bring great benefits to society, and to individuals, when huge datasets can be refined to yield information otherwise unavailable.

Privacy 69
article thumbnail

OpenText debut on Gartner Magic Quadrant for Workforce Engagement Management for Qfiniti solution

OpenText Information Management

The OpenText team is proud to announce its arrival to the Gartner Magic Quadrant for Workforce Engagement Management (WEM) for its OpenText™ Qfiniti solution. According to the report, WEM solutions expand on the already mature workforce optimization (WFO) market by also accommodating technologies that help drive employee engagement within the customer engagement center.

article thumbnail

Ransomware: What you need to know

IT Governance

What is ransomware? Ransomware is one of the fastest-growing forms of cyber attack. According to Bitdefender , there are roughly 2.8 million known unique samples of ransomware, and this number is growing. Ransomware attacks are becoming more sophisticated and cyber attackers are demanding higher payments from their victims. How does ransomware infect your system?

article thumbnail

2017 capture technologies review and predictions for 2018

OpenText Information Management

Capture technologies took a huge step forward in 2017. What will 2018 hold? Let’s start by reviewing 2017- a year that looking like the year that capture technologies fully emerged from the mailroom and transitioned into solutions that could address real-time customer requirements – providing both more accurate data for organizations and better experiences for … The post 2017 capture technologies review and predictions for 2018 appeared first on OpenText Blogs.

68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Government survey reveals GDPR awareness is falling short

IT Governance

The Cyber Security Breaches Survey 2018 from the Department for Digital, Culture, Media and Sport (DCMS) has revealed that only 38% of businesses and 44% of charities have heard of the General Data Protection Regulation (GDPR). This is a worrisome finding, as it is only a matter of months until the new Regulation is enforced. The full report will not be released until April 2018, but the statistics already released provide a comprehensive overview.

GDPR 63
article thumbnail

Head of Austrian DPA Appointed Chair of Article 29 Working Party

Hunton Privacy

On February 7, 2018, representatives of European Data Protection Authorities (“DPAs”) met in Brussels to appoint the new leader of the current Article 29 Data Protection Working Party (the “Working Party”). Andrea Jelinek, head of the Austrian DPA, was elected to the post and will replace Isabelle Falque-Pierrotin, leader of the French DPA, who has represented the Working Party over the past four years.

GDPR 62
article thumbnail

Water Utility Infected by Cryptocurrency Mining Software

Schneier on Security

A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack : hackers compromise computers and force them to mine cryptocurrency for them. This is the first time I've seen it infect SCADA systems, though. It seems that this mining software is benign, and doesn't affect the performance of the hacked computer.

Mining 53
article thumbnail

Gojdue Variant Eludes Microsoft, Google Cloud Protection, Researchers Say

Threatpost

Researchers have identified a new ransomware strain that went undetected by built-in malware protection used by cloud heavyweights Microsoft and Google as recently as January.

Cloud 45
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ATLAS Named an ELO Digital Office Certified Business Partner

Info Source

Boston, MA – February 7, 2018 — ELO Digital Office USA , enabling businesses to improve collaboration and streamline information management in a digital economy, announced today that ATLAS has joined the growing ELO partner network in North America. ATLAS , headquartered in Delafield (WI), consolidates its customers disparate data sources to simplify their digital transformation and deliver world-class business intelligence.

article thumbnail

New Report: Does Bitcoin Pose a Credit Card Fraud Threat?

Rippleshot

The roller coaster price fluctuations of bitcoin has kept the cryptocurrency prevalent in the headlines for months. This week, bitcoin made it to the list of credit card fraud concerns, with — as you can probably guess — stolen identities being the root of the problem. A LA Times article explored the chief concerns around cryptocurrency scams and why banks are getting increasingly skeptical about bitcoin transactions.

Risk 45
article thumbnail

BrickerBot: Internet Vigilantism Ends Don't Justify the Means

Dark Reading

However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

Access 45
article thumbnail

New Versions of A2iA’s Mobile SDKs Boast Expanded Global Footprints, Improved Automatic Image Capture, and Enhanced Extraction Capabilities

Info Source

New York, New York and Paris, France, February 2, 2018 – A2iA (@A2iA), an award-winning developer of artificial intelligence and machine-learning based software for the worldwide data capture, document processing, and payment systems markets, today announced new versions of its a2ia Mobility and a2ia mCapture software toolkits. a2ia Mobility V7.0, a configurable SDK, features offline and client-side image analysis, A2iA’s patented automatic capture feature – Auto-Locate , and data extracti

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

20 Signs You Need to Introduce Automation into Security Ops

Dark Reading

Far too often, organizations approach automation as a solution looking for a problem rather than the other way around.

article thumbnail

European Commission and Article 29 Working Party Urge Respect for International Law in Data Cases

HL Chronicle of Data Protection

Territoriality will continue to be one of the most vexing problems for data regulation in 2018. One aspect of this debate relates to whether a U.S. judge can compel the disclosure of personal data located in Europe without using international treaty mechanisms. This issue is currently being considered by the United States Supreme Court in the case United States v.

article thumbnail

February 15 deadline looms for first DFS Cybersecurity Certification

Data Protection Report

February 15, 2018, is quickly approaching and any entity subject to New York’s cybersecurity regulation (23 NYCRR Part 500) must file its first annual certification of compliance with the New York State Department of Financial Services (DFS) by that date. New York imposes cybersecurity requirements on all entities (covered entities) subject to the jurisdiction of the DFS, which include not only banks and insurers, but also any persons regulated by the DFS, including the newest DFS licensees, tho

article thumbnail

Tennessee Hospital Hit With Cryptocurrency Mining Malware

Dark Reading

Decatur County General Hospital is notifying 24,000 patients of cryptocurrency mining software on its EMR system.

Mining 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Glitch in the Matrix – The Vital Role of Communication Between All Stakeholders in eDiscovery: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Jim Gill’s writing about eDiscovery and Data Management has been twice recognized with JD Supra Reader’s Choice Awards and he holds an MFA in Creative Writing from Southern Illinois University, Carbondale. Before working in eDiscovery, Jim taught college writing at a number of institutions and his creative work has been published in numerous national literary journals, as well as being nominated for a Pushcart Prize.

article thumbnail

Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS Server

Threatpost

The vulnerability also exposed login credentials for a massive national insurance claims database, Upguard says.

article thumbnail

New POS Malware Steals Data via DNS Traffic

Dark Reading

UDPoS is disguised to appear like a LogMeIn service pack, Forcepoint says.

57