Wed.Mar 28, 2018

article thumbnail

Ransomware Payments: Where Do the Bitcoins Go?

Data Breach Today

Researchers Track the Flow of Ransoms Paid by Cerber, Locky and Other Victims Ransomware isn't an easy area to study. But a team of researchers has calculated the minimum paid by all ransomware victims over a two-year period, and found that nearly 75 percent of the bitcoins attackers received got funneled onto Russia's now-shuttered BTC-e cryptocurrency exchange.

article thumbnail

Is 2018 the Tipping Point in Digital Transformation?

Bill Schmarzo - Dell EMC

“Survival, in the cool economics of biology, means simply the persistence of one’s own genes in the generations to follow.” — Lewis Thomas. A recent article in The Economist titled “ The Year of the Incumbent ” postulates that 2018 is the year that the incumbents “get back into the game” by stealing the momentum from technology startups to reclaim their spots atop the market valuation charts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook announces privacy tools to 'put people in more control' of data

The Guardian Data Protection

Corporation suggests changes are response to Cambridge Analytica scandal, with EU set to toughen data protection rules in May Facebook is launching a range of new tools in an effort to “put people in more control over their privacy” in the buildup to new EU regulations that tighten up data protection. The changes come after a troubling two weeks for the company, which is battling with the fallout of the Cambridge Analytica files.

Privacy 96
article thumbnail

List of data breaches and cyber attacks in March 2018

IT Governance

Healthcare breaches are common in our monthly lists – but the number of incidents this month is insane. Take a look at the list, and you’ll quickly notice that the majority of them are healthcare related. There’s a mixture of incidents in there, from a rogue employee to someone accidentally sending information to the wrong fax number. Yes, I said fax….

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Enterprises Should Control Their Encryption Keys

Thales Cloud Protection & Licensing

Cloud providers have done a good job of integrating default encryption services within their core infrastructure. However, as discussed in previous blogs , the encryption service is only as secure as the keys that are used to encrypt the data. Enterprises cannot ignore the responsibility of implementing a strong key assurance service that ensures they maintain control of their own risks.

More Trending

article thumbnail

Tracing Stolen Bitcoin

Schneier on Security

Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post : Previous attempts to track tainted coins had used either the "poison" or the "haircut" method. Suppose I open a new address and pay into it three stolen bitcoin followed by seven freshly-mined ones. Then under poison, the output is ten stolen bitcoin, while under haircut it's ten bitcoin that are marked 30% stolen.

article thumbnail

How to write an ISO 22301-compliant business continuity plan – with example template

IT Governance

ISO 22301 certification requires organisations to demonstrate their compliance with appropriate documentation , including a business continuity plan. In Disaster Recovery and Business Continuity , Thejendra B.S. defines the business continuity plan as the “process of developing and documenting arrangements and procedures that enable an organisation to respond to an event that lasts for an unacceptable period of time and return to performing its critical functions after an interruption”.

article thumbnail

Getting Ahead of Internet of Things Security in the Enterprise

Dark Reading

In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all network access points.

IoT 55
article thumbnail

Simplify your risk assessments

IT Governance

A risk assessment enables you to identify, analyse and evaluate your organisation’s risk. By identifying gaps between people, processes and technology, you can minimise and prepare for potential threats. Risk assessments are central to many standards, including ISO 27001, the international standard that describes best practice for an information security management system (ISMS).

Risk 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bad Microsoft Meltdown Patch Made Some Windows Systems Less Secure

Threatpost

Researcher finds Microsoft’s January Patch Tuesday release included a fix for the Intel Meltdown bug, however the update opened up a new vulnerability.

article thumbnail

Secdo AI-Powered Incident Response Redefines Battle Against Malware

eSecurity Planet

Secdo offers an incident response platform that combines endpoint protection with cloud-based AI that handles threats in real time.

Cloud 56
article thumbnail

Fixing Hacks Has Deadly Impact on Hospitals

Dark Reading

A study from Vanderbilt University shows that remediating data breaches has a very real impact on mortality rates at hospitals.

article thumbnail

Breaking the Anonymity in the Cryptocurrency Monero

Schneier on Security

Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post.

Paper 50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Destructive and False Flag Cyberattacks to Escalate

Dark Reading

Rising geopolitical tensions between the US and Russia, Iran, and others are the perfect recipe for nastier nation-state cyberattacks.

50
article thumbnail

How 'digital twins' will revolutionize product software development

Information Management Resources

This technology integrates big data, AI, machine learning and IoT with data to create simulation models that update and change as their physical counterpart changes, like an avatar.

article thumbnail

Is 2018 the Tipping Point in Digital Transformation?

Bill Schmarzo - Dell EMC

“Survival, in the cool economics of biology, means simply the persistence of one’s own genes in the generations to follow.” — Lewis Thomas. A recent article in The Economist titled “ The Year of the Incumbent ” postulates that 2018 is the year that the incumbents “get back into the game” by stealing the momentum from technology startups to reclaim their spots atop the market valuation charts.

article thumbnail

Why GDPR is the best opportunity data managers ever had

Information Management Resources

Compliance with the new requirements will strengthen affected organizations and create a path to better store, control, analyze and access customer information.

GDPR 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Top Reasons Your Business Needs a Document Retention Policy

Archive Document Data Storage

Do you have a plan for managing and protecting your documents? A document retention policy establishes what documents to keep, how long to store them, and when they should be destroyed. Here are the top reasons your organisation needs a document retention policy: . Clutter Reduction. Office clutter stifles productivity and dampens employee morale. A document retention policy reduces clutter by allowing you to destroy documents when retention requirements expire.

article thumbnail

DocuWare Unveils New Branding to Further Drive Global Growth

Info Source

. New Windsor NY, March 19, 2018 – DocuWare , provider of cloud solutions for document management and workflow automation, unveiled its new logo and corporate identity that realigns the company’s visual brand to its modern, cloud-first approach. Capping years of impressive growth, the logo and identity establish a fresh iconic brand to drive the company’s ambitious future.

article thumbnail

What Does MiFID II Mean for Marketing?

Hanzo Learning Center

Downing, a London-based investment manager, recently notified clients and advisers about the drop in value of its Downing Renewables EIS portfolio, which was launched in 2012 and carries a 30% income tax relief. That’s a lot of transparency coming from a financial services firm, right?

article thumbnail

How Measuring Security for Risk & ROI Can Empower CISOs

Dark Reading

For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?

Risk 50
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Pseudonymization Can Help You Comply with GDPR

eSecurity Planet

A look at how pseudonymization can help enterprises comply with the EU's tough new data privacy law.

GDPR 45
article thumbnail

Automating Ethics for Cybersecurity

Dark Reading

Having a code of ethics and enforcing it are two different things.

article thumbnail

Today is the Day for the University of Florida E-Discovery Conference!: eDiscovery Best Practices

eDiscovery Daily

The University of Florida E-Discovery Conference is being held today! And, for the first time, I’m going to be there! Regardless of where you are, it’s not too late to attend! The focus of this year’s conference is effectively managing the everyday case and they will have interesting sessions throughout the day, covering topics ranging from eDiscovery security and data protection to early assessment of the case and the data to keywords, TAR and AI (do I need to spell out those acronyms anymore

article thumbnail

Baltimore Hit with Hack on 911 System

Dark Reading

An attack took down part of Baltimore's 911 system for 17 hours over the weekend, and details are still in short supply.

43
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cisco Patches Two Critical RCE Bugs in IOS XE Software

Threatpost

Cisco releases 22 patches as part of its semiannual Cisco IOS and IOS XE software security advisory.

article thumbnail

Kaspersky Lab Open-Sources its Threat-Hunting Tool

Dark Reading

'KLara' was built to speed up and automate the process of identifying malware samples.

IT 51
article thumbnail

Broker watchdogs accused of letting sensitive data go public

Information Management Resources

According to a complaint lodged with the U.S. SEC, personal information such as brokerage account numbers provided to an industry-funded regulator have long been easily accessible online.

Access 36