Fri.Jul 06, 2018

article thumbnail

UK to Establish Court for Cybercrime in London

Data Breach Today

The Facility Will Also Handle Economic Crime And Fraud Cases The U.K. has approved a plan to build a cutting-edge court complex in London designed to handle cybercrime, fraud and economic crime. The facility is expected to be a growth driver for the country's legal industry, despite the U.K.'s pending withdrawal from the European Union.

150
150
article thumbnail

New Account Fraud's 'Perfect Storm'

Data Breach Today

Aite's Julie Conroy Unveils New Findings on Banking Fraud Aite's Julie Conroy calls it a "perfect storm." In the post-EMV U.S., and in the wake of massive data breaches and the move to mobility, financial institutions are besieged by a new flood of new account fraud. How can data analytics help them improve fraud prevention?

Analytics 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Risk assessments – software Vs spreadsheets

IT Governance

Risk assessments are at the core of many standards, including ISO 27001 , the international standard that describes best practice for an information security management system (ISMS). However, they are notoriously time-consuming and complex. Failure to conduct an accurate risk assessment could result in your organisation overlooking, underestimating or neglecting risks that could be severely damaging. .

Risk 61
article thumbnail

Why You Can Take Fraud Advice from This ex-Con

Data Breach Today

Former Fraudster Brett Johnson Shares Intel on How to Stop Common Schemes It's a fair question: Can you trust the fraud advice you're given from a former fraudster? Especially one who's betrayed law enforcement before? Brett Johnson says he's abandoned crime for good, and he shares insight on the types of fraud schemes he once practiced.

IT 113
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ExxonMobil Bungles Rewards Card Debut

Krebs on Security

Energy giant ExxonMobil recently sent snail mail letters to its Plenti rewards card members stating that the points program was being replaced with a new one called Exxon Mobil Rewards+. Unfortunately, the letter includes a confusing toll free number and directs customers to a parked page that tries to foist Web browser extensions on visitors. The mailer (the first page of which is screenshotted below) urges customers to visit exxonmobilrewardsplus[dot]com, to download its mobile app, and to cal

Marketing 139

More Trending

article thumbnail

European Parliament Calls for Suspension of EU-U.S. Privacy Shield Unless U.S. Can “Fully Comply”

Hunton Privacy

On July 5, 2018, the European Parliament issued a nonbinding resolution (“the Resolution”) that calls on the European Commission to suspend the EU-U.S. Privacy Shield unless U.S. authorities can “fully comply” with the framework by September 1, 2018. The Resolution states that the data transfer mechanism does not provide the adequate level of protection for personal data as required by EU data protection law.

Privacy 72
article thumbnail

Cryptocurrency's Skyrocketing Money Laundering Problem

Data Breach Today

Leading the latest edition of the ISMG Security Report: CipherTrace CEO Dave Jevans discusses recent research on cryptocurrency money laundering and whether regulation is possible. Plus, California passes a new privacy law.

Privacy 111
article thumbnail

Weekly podcast: NHS Digital, Typeform and ICO registration fine

IT Governance

This week, we discuss the unauthorised sharing of 150,000 patients’ confidential health data, the first ripples from the Typeform data breach, and a £4,500 fine for a company that didn’t register with the ICO. Hello and welcome to the IT Governance podcast for Friday, 6 July. Here are this week’s stories. NHS Digital has blamed a third-party coding error for a data breach in which the confidential health information of 150,000 patients was shared against their will.

article thumbnail

Authentication in the Era of Trusted Identity

Data Breach Today

OneSpan's David Vergara on the Combined Power of Legacy and Emerging Technologies At the advent of real-time payments, it's more critical than ever for organizations to quickly authenticate users and transactions. And David Vergara of OneSpan says emerging tools build upon legacy technologies to ensure trusted identity with minimal friction.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

[INFOGRAPHIC] Be a Records Management Hero!

Gimmal

Earlier this year, we unveiled our superhero theme, inviting records managers to join us at their regional ARMA events (as well as ARMA Live!) and answer the question: "what kind of records management hero are you?".

article thumbnail

Kenya Considers Data Protection Bill

Hunton Privacy

On July 3, 2018, a draft bill (the “Data Protection Bill”) was introduced that would establish a comprehensive data protection regime in Kenya. The Data Protection Bill would require “banks, telecommunications operators, utilities, private and public companies and individuals” to obtain data subjects’ consent before collecting and processing their personal data.

article thumbnail

Reactive or Proactive? Making the Case for New Kill Chains

Dark Reading

Classic kill chain models that aim to find and stop external attacks don't account for threats from insiders. Here what a modern kill chain should include.

53
article thumbnail

Weekly Update 94

Troy Hunt

It's a week of tweets! I only wrote the one short blog post this week, but I spent a heap of time on the Twitters arguing with people instead so. that's something? But seriously, there was a huge amount of discussion around HTTPS in particular and some very vocal opinions around its usefulness (or lack thereof), which frankly, had myself and many others tearing their hair out.

Mining 46
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Putin Pushes for Global Cybersecurity Cooperation

Dark Reading

At a Moscow-based security conference, Russian President Vladimir Putin said countries should work together amid the rise of cyberthreats.

article thumbnail

How can you improve ROI?

OpenText Information Management

User adoption is a major factor—and one that is often missed—in achieving success and return on investment (ROI) on enterprise software implementations. While much energy is spent deploying technology solutions, deployment is only the first step in the adoption evolution process. Organizations who have committed to the enablement of their people see a significantly reduced spend on implementation, … The post How can you improve ROI?

45
article thumbnail

Trading Platforms Riddled With Severe Flaws

Dark Reading

In spite of routing trillions of dollars of stock and commodity trades every day, financial cousins to online banking applications are written very insecurely.

48
article thumbnail

Designing Employee Security Awareness Training That Works

eSecurity Planet

The secret to effective employee security awareness training boils down to three things: Train early, often, and explain why.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Former NSO Group Employee Steals, Sells Spy Tools

Dark Reading

The Israeli hacking firm says its stolen software is worth hundreds of millions of dollars.

IT 56
article thumbnail

The NSA's Domestic Surveillance Centers

Schneier on Security

The Intercept has a long story about the NSA's domestic interception points. Includes some new Snowden documents.

Privacy 50
article thumbnail

Keeping False Positives in Check

Threatpost

InfoSec Insider Justin Jett shares his opinions on how to avoid false positive security threat fatigue before sets in and companies drop their guard.

article thumbnail

Knowledge management becomes top-of-mind again for many firms

Information Management Resources

By helping publishers maximize the value of the digital assets available across their organization, KM today is well positioned to move the knowledge supply chain along more efficiently than ever before.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Patches Critical Remote Code Execution Bugs in Android OS

Threatpost

The July Android Security bulletin tackles 44 vulnerabilities in all, with the bulk rated high in severity.

article thumbnail

New Malware Strain Targets Cryptocurrency Fans Who Use Macs

Dark Reading

OSX.Dummy depends on substantial help from an unwary victim.

58
article thumbnail

Newsmaker Interview: VDOO CEO Talks Top IoT Threats

Threatpost

VDOO's CEO talks to Threatpost about security issues discovered in Axis IP cameras and issues overall in the IoT security market.

IoT 42
article thumbnail

Empowering the right employees to maintain GDPR compliance

Information Management Resources

Achieving and maintaining the goals of the General Data Protection Regulation requires more than changes to software; it also requires appropriate alignment with people and processes.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Old Malware Gives Criminals Tricky New Choice: Ransomware or Mining

Threatpost

The Rakhni Trojan is now giving bad actors the ability to infect victims either with a ransomware cryptor or a miner.

Mining 43
article thumbnail

BlackRock joins the AI and robotics ETF craze

Information Management Resources

The firm announced the inception of its iShares Robotics and Artificial Intelligence ETF, joining a crowded field in these technology areas that’s seen massive outflows in recent periods.

article thumbnail

The Cybersecurity Risk Some Companies Won’t Discuss

Adam Levin

It’s been a long compromise-filled road with billions of victims along the way, but businesses are finally embracing the need for creating a culture where good cyber hygiene is emphasized and rewarded. But how much is enough? It is increasingly common knowledge that email attachments can be dangerous. And most people these days know that they should be using a harder to guess password than “password” or “123qwe.” That said, there’s still a looming threat

Risk 40