Thu.Apr 12, 2018

article thumbnail

HHS Warns of SamSam Ransomware Attacks

Data Breach Today

At Least Eight U.S. Organizations Hit So Far This Year The Department of Health and Human Services is warning the healthcare sector about ongoing attacks involving SamSam ransomware that have impacted at least eight U.S. organizations so far this year. What mitigation steps are recommended?

article thumbnail

Australian bill to create back door into encrypted apps in 'advanced stages'

The Guardian Data Protection

Government moves ahead with legislation despite criticism from the opposition The Australian government is pushing ahead with controversial legislation it says will create “back doors” into encrypted communication services – but still can’t say when it will introduce the bill. After originally aiming to have the legislation before parliament in the first quarter of this year, the government has delayed its introduction.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hot Topics at the 2018 RSA Conference

Data Breach Today

Regulations and New Technologies Are in the Spotlight GDPR compliance. New uses for blockchain. IoT security. These are some of the hottest topics on tap at the 2018 RSA Conference, taking place April 16-20 in San Francisco.

article thumbnail

Reader Favorites April 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover RIM software success, records protection and recovery, and green file storage solutions. Learn about strategies to ensure your RIM software is successful, how your RIM program strategy can help your organization after a large scale disaster in a hybrid environment, and how to reduce your environmental impact through [.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Deception Technology: Expect a Trickle Down to MSSPs

Data Breach Today

Deception technology has been gaining traction as a way for organizations to get a view on how attackers are targeting their assets. Rik Turner, principal analyst at the consultancy Ovum, says he expects MSSPs to incorporate deception technology, making it more accessible to smaller organizations.

Access 100

More Trending

article thumbnail

Instagram to let users download everything they have ever shared

The Guardian Data Protection

New portability tool will allow users to extract copy of own content posted on social network Instagram has confirmed it will let users download their personal data, including previously shared photos, videos and messages, as it prepares for the European data regulation GDPR. While its parent company, Facebook, had announced a suite of GDPR controls, which Mark Zuckerberg emphasised during his testimony to Congress this week, Instagram had been quiet on the issue.

GDPR 85
article thumbnail

Kick-start your career in information security management

IT Governance

If you’re looking to develop a career in information security, the CISMP training course is a great starting point. It provides a broad introduction to information security management upon which more technical qualifications can be built. CISMP is also suitable for business professionals looking to gain a deeper understanding of information security, and is especially valuable to those working in the public sector, as it is part of the CESG Certified Professional Scheme.

article thumbnail

Microsoft Regional Director (Redux)

Troy Hunt

I received a very nice email this week: Congratulations, your nomination has been accepted to the Microsoft Regional Director program! I am pleased to welcome you back to this worldwide community of technology thought leaders and thank you for being a part of this community. Just over 2 years ago, I first became a Microsoft Regional Director. This is a role that has meant a great deal to me over that time; it's not one you can sit an exam for and no amount of money will buy you one either.

Cloud 63
article thumbnail

10 key areas to identify gaps in your GDPR compliance

IT Governance

Compliance with the EU General Data Protection Regulation (GDPR) should be a priority for all EU organisations, and non-EU organisations that monitor the behaviour or offer goods and services to EU residents. The GDPR is far more extensive in scope and application than the current Data Protection Act. The Regulation extends the data rights of individuals, and requires organisations to develop clear policies and procedures, and adopt “appropriate technical and organisational measures”, to protect

GDPR 63
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cloudflare's Plan to Protect the Whole Internet Comes Into Focus

WIRED Threat Level

One of the internet's biggest infrastructure companies is expanding its protections beyond the web.

IT 75
article thumbnail

Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

Thales Cloud Protection & Licensing

Nick Jovanovic, VP Federal of Thales eSecurity Federal (a division of TDSI), recently spoke with Federal Tech Talk’s John Gilroy about federal agency data security and key findings from the 2018 Thales Data Threat Report, Federal Government Edition. Federal Tech Talk, which looks at the world of high technology in the U.S. federal government, airs on Federal News Radio, a radio station in the Washington, D.C. region.

article thumbnail

Gimmal is excited to introduce our CRO, Brian McLaurin

Gimmal

Gimmal is happy to announce that Brian McLaurin has joined our leadership team as Chief Revenue Officer, a newly-created role.

63
article thumbnail

New ‘Early Bird’ Code Injection Technique Helps APT33 Evade Detection

Threatpost

Researchers have identified what they are calling an Early Bird code injection technique used by the Iranian group APT33 to burrow the TurnedUp malware inside infected systems while evading anti-malware tools.

48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cybersecurity Insurance

Schneier on Security

Good article about how difficult it is to insure an organization against Internet attacks, and how expensive the insurance is. Companies like retailers, banks, and healthcare providers began seeking out cyberinsurance in the early 2000s, when states first passed data breach notification laws. But even with 20 years' worth of experience and claims data in cyberinsurance, underwriters still struggle with how to model and quantify a unique type of risk.

article thumbnail

The GDPR: What technical measures do you need to conduct?

IT Governance

Article 32 of the EU General Data Protection Regulation (GDPR) mandates that organisations implement “appropriate technical and organisational measures” to manage risks. It provides a handful of examples of those measures, but it doesn’t go into detail about what they consist of or why they are necessary. This blog fills that gap, discussing vulnerability scans, penetration tests and the way they work together.

GDPR 45
article thumbnail

Information ownership or controlled trust?

OpenText Information Management

In my previous blog I introduced the concept of the ‘outside-in’ model of Identity and Access Management (IAM). It is designed to meet the needs of increasingly extended, collaborative and digital supply chains. In this blog, I’ll look further into why organizations need to adopt this new model and cover some key areas that you’ll … The post Information ownership or controlled trust?

Access 45
article thumbnail

6 ways to attain top benefits from artificial intelligence & machine learning

Information Management Resources

It can seem overwhelming to choose the right implementation approaches to these hot technologies. Here are six effective ways to attain quantifiable results from AI and ML.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Outlook Bug Allowed Hackers to Use.RTF Files To Steal Windows Passwords

Threatpost

Microsoft patched a bug that allowed attackers to steal a target’s Windows account password via previewed Outlook message.

article thumbnail

The Top 10 Sessions to Catch at RSA Conference 2018

eSecurity Planet

There are hundreds of ways to spend your time at the 2018 RSA Conference, but here are the 10 sessions that people will be talking about.

47
article thumbnail

[NEWS] D.C. Court: Accessing Public Information is Not a Computer Crime

Architect Security

[USA] D.C. Court: Accessing Public Information is Not a Computer Crime In a great win for OSINT and general Internet freedom (as the EFF says, “Good news for anyone who uses the Internet as a source of information” LOL), a DC court has ruled that automated tools can be used for collecting information on the […].

Access 40
article thumbnail

How Attackers Can Exploit rTorrent with Monero Cryptocurrency Miner

Dark Reading

As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to extend their operations.

45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Calls For Regulation Build After Facebook Privacy Fallout

Threatpost

Political actors and privacy activists are calling for more regulations on data privacy after Facebook's data security scandal.

Privacy 44
article thumbnail

Microsegmentation: Strong Security in Small Packages

Dark Reading

A deep dive into how organizations can effectively devise and implement microsegmentation in a software-defined networking data center.

article thumbnail

Busting three cloud and edge computing myths

Information Management Resources

As organizations begin eyeing a move to this technology, various misperceptions are clouding many potential migrations. Here are three important falsehoods to consider.

Cloud 37
article thumbnail

Businesses Calculate Cost of GDPR as Deadline Looms

Dark Reading

Surveys highlight the financial burden of GDPR as companies scramble to meet the May 25 deadline.

GDPR 48
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Morgan Stanley says data drive to push next tech growth wave

Information Management Resources

This is the first computing cycle in which a number of technologies are emerging at once, including the Internet of Things, artificial intelligence and virtual or augmented reality, and automation.

article thumbnail

Android Patches Can Skip a Beat

Dark Reading

Researchers have found that some Android devices are skipping patches and lying about it.

IT 47
article thumbnail

Fake news adds to cyber risks for business, U.K. report says

Information Management Resources

Security of data stored in the cloud also 'will become a tempting target for a range of cyber criminals,' the NCSC said, as currently only 40 percent of data stored there is access-secured.

Risk 30