Wed.Mar 21, 2018

article thumbnail

Facebook and Cambridge Analytica: Data Scandal Intensifies

Data Breach Today

US, UK and Canada Have Begun Probing Data Leak and Privacy Repercussions Regulators, attorneys general and lawmakers in the U.S., U.K. and Canada are attempting to unravel the events that led to the personal information for upwards of 60 million Facebook users leaking to a London-based voter-profiling firm.

Privacy 178
article thumbnail

The Cambridge Analytica saga is a scandal of Facebook’s own making | John Harris

The Guardian Data Protection

This mess was inevitable. Facebook has worked tirelessly to gather as much data on users as it could – and to profit from it Big corporate scandals tend not to come completely out of the blue. As with politicians, accident-prone companies rarely become that way by accident, and a spectacular crisis can often arrive at the end of a long spell of bad decisions and confidence curdling into hubris.

Mining 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sizing Up Crypto Wallet Vulnerabilities

Data Breach Today

Al Pascual of Javelin Strategy and Research discusses a new report that shows that while crypto wallets may be considered to be at the sharp end of payments innovation, the security vulnerabilities they face are much the same as those that already exist in digital banking and payments.

Security 144
article thumbnail

Facebook Privacy Settings: A Complete Guide to Making Your Account More Secure

WIRED Threat Level

Despite the repeated privacy lapses, Facebook offers a fairly robust set of tools to control who knows what about you.

Privacy 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chipmaker AMD Confirms 13 Chipset Flaws, Preps Fixes

Data Breach Today

Firmware Updates Coming for Embedded Security Control Processor Multinational semiconductor maker Advanced Micro Devices has confirmed that there are 13 flaws in some of its chipsets that could be exploited to manipulate chip firmware for malicious purposes. AMD plans to provide fixes in the form of firmware updates that it claims should not affect system performance.

Security 125

More Trending

article thumbnail

Web Conference Report: “Deploying Containers in the Age of GDPR”

Thales Cloud Protection & Licensing

I was fortunate to be one of the presenters at SecureWorld’s recent web conference on “ Deploying Containers in the Age of GDPR.” I suggest you check it out. Here is a taste of what we discussed. A real-time poll of webinar participants asked how ready they think their organizations are for the GDPR deadline of May 25, 2018. It indicated 40% “are doing everything they know about and should be pretty much there.

GDPR 83
article thumbnail

4 reasons why phishing is so successful

IT Governance

Phishing attacks are on the rise, evolving in variety and sophistication and threatening email security. An IRONSCALES report has revealed that 90–95% of all successful cyber attacks begin with a phishing email. Why is phishing so popular among fraudsters, and why are they so successful? 1. Users are the weak link in the chain. According to the report, phishers are adept at exploiting ignorance, negligence and human nature.

article thumbnail

The Guardian view on big tech: a new era needs new rules | Editorial

The Guardian Data Protection

Google, Apple, Facebook and Amazon are too big and too powerful. Regulation has to catch up with the changing character of the digital economy One beneficiary of the scandal surrounding a massive data leak from Facebook has been its fellow technology giant Amazon. Tens of billions of dollars were wiped from Facebook’s value in just a few days. Other tech companies, including Google, also suffered.

Retail 75
article thumbnail

Think 2018: Our favorite highlights from Wednesday

IBM Big Data Hub

Think 2018 is in full swing. We’re inspired hearing from leaders across industries using analytics to transform their business. And we’re thrilled to take part in conversations about data science, machine learning, AI and much more. Here are some highlights from Wednesday at Think.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Sidley’s Fourth Annual Privacy and Cybersecurity Roundtable on March 26

Data Matters

Sidley will be hosting its annual Privacy and Cybersecurity Roundtable on Monday, March 26 starting at 1:30 PM EST. Two panels will highlight EU General Data Protection and the Future of Privacy and Cybersecurity Enforcement, followed by a special data protection themed reception featuring “A Taste of Adequacy and Essentially Equivalent Wines and Spirits”.

Privacy 60
article thumbnail

Google's Cloud Security Command Center Should Help Stop Data Leaks

WIRED Threat Level

Human error leads to countless leaky databases. But Google has some new protections in place to help cloud customers better help themselves.

Cloud 75
article thumbnail

How Serverless Computing Reshapes Security

Dark Reading

The new division of responsibility moves some security concerns off a business's plate while changing priorities for other risks.

article thumbnail

Netflix Opens Public Bug Bounty Program with $15K Payout Cap

Threatpost

Netflix opens up bug bounty program to all white hat hackers and ups the ante for bugs to as much as $15,000.

82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Choose the right SAQ to demonstrate PCI DSS compliance

IT Governance

As we recently discussed , any organisation that plans to demonstrate compliance with the Payment Card Industry Data Security Standard (PCI DSS) by completing a self-assessment questionnaire (SAQ) needs to make sure they have selected the right form. There are nine types of SAQ that apply in different circumstances. SAQ A. For merchants that outsource their entire card data processing to validated third parties.

article thumbnail

AI is poised to transform Legal

OpenText Information Management

Much has been written about predictions that lawyers will lose their jobs to Artificial Intelligence (AI). At OpenText™, we approach it much more from the perspective that AI will automate tasks that aren’t well suited to high-priced lawyers – and will allow them to focus on more value added (revenue generating) activities that require their … The post AI is poised to transform Legal appeared first on OpenText Blogs.

article thumbnail

Orbitz Warns 880,000 Payment Cards Suspected Stolen

Threatpost

Orbitz said Tuesday a breach of both its consumer and partner platform may have led to the disclosure of 880,000 payment cards.

IT 64
article thumbnail

Today at Think 2018: What you can’t miss Wednesday

IBM Big Data Hub

Are you ready for another exciting day of Think 2018? There’s a big day planned for you at the Cloud & Data Campus and we’re here to help you navigate the many exciting sessions. Here are our top analytics picks of the day.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Types of Firewalls: What IT Security Pros Need to Know

eSecurity Planet

Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.

IT 57
article thumbnail

Hijacking Computers for Cryptocurrency Mining

Schneier on Security

Interesting paper " A first look at browser-based cryptojacking ": Abstract : In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code-bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or knowledge, and pays out the seigniorage to the website.

Mining 50
article thumbnail

SOC in Translation: 4 Common Phrases & Why They Raise Flags

Dark Reading

By keeping an ear out for out for catchphrases like "Just ask Stu" or "I've got a bad feeling about this," CISOs can overcome the barriers that get between business leaders and their security teams.

article thumbnail

Zuckerberg Breaks Silence: ‘We Made Mistakes’ Regarding Cambridge Analytica Debacle

Threatpost

Facebook CEO Mark Zuckerberg broke his silence on the Cambridge Analytica scandal that has unfolded this past week, acknowledging that “we made mistakes” and vowing to step up to the plate when it comes to data security.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cybersecurity Spring Cleaning: 3 Must-Dos for 2018

Dark Reading

Why 'Spectre' and 'Meltdown,' GDPR, and the Internet of Things are three areas security teams should declutter and prioritize in the coming months.

article thumbnail

Facebook Fallout Continues as Politicians Call For Legal Action

Threatpost

Politians are calling for legal ramifications for Facebook on the heels of the data privacy scandal that rocked the social media giant this week.

article thumbnail

Online Sandboxing: A Stash for Exfiltrated Data?

Dark Reading

SafeBreach researchers extend leaky sandbox research to show how services like VirusTotal and Hybrid Analysis could be used to steal data from air-gapped systems.

47
article thumbnail

We Are Launching Our New Data Protection Qualifications!

Managing Your Information

Tkm is delighted to be launching a suite of 3 approved data protection qualifications on 9 April 2018 at the Information Market as part of the ICO’s Data Protection Practitioners Conference. The qualifications are based on specific learning outcomes and performance criteria, and have been designed to help people apply UK data protection legislation.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Gartner Expects 2018 IoT Security Spending to Reach $1.5 Billion

Dark Reading

Regulations, breach concerns will push spending to over $3 billion by 2021, analyst firm says.

IoT 55
article thumbnail

Audio Blog: How does social media impact getting a job?

Architect Security

Today on the blog, we discuss: How does social media impact getting a job? Find out more at my sister-site, IncreaseYourSecurity.org.

article thumbnail

DHS Chief: Election Security Now Top Priority Among Critical Systems

Dark Reading

Homeland Security Secretary Kirstjen Nielsen told Congress today that her department is working to assist states with their election systems' security.