Fri.Apr 27, 2018

article thumbnail

NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach?

IT Governance

Over the next few months, organisations across the EU and the rest of the world will be coming to terms with two new cyber security laws: the EU General Data Protection Regulation (GDPR) and the Directive on security of network and information systems (NIS Directive). Their requirements overlap in many places, which has inevitably led to questions about whether an organisation can be fined twice for the same incident.

GDPR 65
article thumbnail

FAQ: So text messages can be records – how do we capture and retain them?

The Texas Record

If you read Joshua Clark’s recent post on text messages, you know that, depending on content, they can be government records that are subject to retention rules. The question then becomes: how do we capture them so that we can retain them for the appropriate retention period? There are several methods that can be utilized, from the simple to the more complex, and from the low- or no-cost to the moderate-cost.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Zero Login:' The Rise of Invisible Identity

Dark Reading

Will new authentication technologies that recognize users on the basis of their behaviors finally mean the death of the despised password?

article thumbnail

FDA Unveils Plan for 'Software as a Medical Device' Review

Data Breach Today

Agency Says It Would Assess Vendors' 'Cybersecurity Responsibility' The FDA is proposing to pre-certify vendors of certain medical device software, including various mobile apps, allowing the companies to skip the agency's much more rigorous pre-market approval process for hardware-based medical devices.

Marketing 172
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The wealth of our collective data should belong to all of us | Chris Hughes

The Guardian Data Protection

The Facebook co-founder Chris Hughes lays out why we all should benefit from the profits produced by our data Nearly every moment of our lives, we’re producing data about ourselves that companies profit from. Our smartwatches know when we wake up, Alexa listens to our private conversations, our phones track where we go, Google knows what we email and search, Facebook knows what we share with friends, and our loyalty cards remember what we buy.

More Trending

article thumbnail

UK has six months to rewrite snooper's charter, high court rules

The Guardian Data Protection

Judges say Investigatory Powers Act is incompatible with EU law after legal challenge by Liberty The British government must rewrite its mass data surveillance legislation because it is incompatible with European law, the high court has ruled. Judges have given ministers and officials six months to redraft the 2016 Investigatory Powers Act , labelled the snooper’s charter by critics, following a crowdfunded challenge by the human rights group Liberty.

article thumbnail

Countdown to GDPR Enforcement: Deadline Looms

Data Breach Today

In this edition of the ISMG Security Report: Privacy watchdogs in the EU begin enforcing GDPR in less than 30 days; are organizations ready? Also, a look at the top 10, real-world online threats facing business and financial software firm Intuit.

GDPR 113
article thumbnail

Botched TSB system upgrade causes data breach

IT Governance

TSB’s chief executive, Paul Pester, has said the bank is on its knees following last weekend’s chaotic data migration. Mr Pester’s comments are in stark contrast to the optimism shown by the chairman of TSB’s new owner, the Spanish Banco Sabadell, earlier in the week. Josep Oliu boasted that, “With this operation, Sabadell demonstrates its capacity of technological management not only in national but also international integrations.

article thumbnail

Software Legend Ray Ozzie Wades Into Lawful Access Tangle

Data Breach Today

Critic Says Ozzie's Idea Is an Unworkable Twist on Key Escrow Can technology solve the problem of giving law enforcement access to all encrypted communications without additional risks to the public? Software legend Ray Ozzie says he has an idea. But it's unlikely to quell the debate over hard-to-break encryption.

Access 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Joy Reid Blames Hackers, Just Like Everyone Else

WIRED Threat Level

Joy Reid may have very well been the target of a malicious breach. Or she's just the latest person to blame hackers for her past mistakes.

article thumbnail

Deception Technology: Dispelling Myths

Data Breach Today

Carolyn Crandall of Attivo Networks on Improving Intrusion Detection Because network intrusions are inevitable, organizations need to improve detection to more quickly respond to attacks, says Carolyn Crandall of Attivo Networks. And deception technology can play a critical role, she says.

100
100
article thumbnail

Enhancing Pwned Passwords Privacy by Exclusively Supporting Anonymity

Troy Hunt

When I launched Pwned Passwords in August , I honestly didn't know how much it would be used. I made 320M SHA-1 password hashes downloadable and also stood up an API to query the data "as a service" by either a plain text password or a SHA-1 hash. (Incidentally, for anyone about to lose their mind over SHA-1, read that launch post as to why that hashing algorithm is used.

article thumbnail

TSB Bank Disaster

Schneier on Security

This seems like an absolute disaster: The very short version is that a UK bank, TSB, which had been merged into and then many years later was spun out of Lloyds Bank, was bought by the Spanish bank Banco Sabadell in 2015. Lloyds had continued to run the TSB systems and was to transfer them over to Sabadell over the weekend. It's turned out to be an epic failure, and it's not clear if and when this can be straightened out.

Access 60
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ThaiCERT Seizes Hidden Cobra Server Linked to GhostSecret, Sony Attacks

Threatpost

It's analyzing the server, operated by the North Korea-sponsored APT, which was used to control the global GhostSecret espionage campaign affecting 17 countries.

IT 55
article thumbnail

Weekly podcast: TSB, hotel locks and NATO exercise

IT Governance

This week, we discuss TSB’s chaotic system upgrade, a security flaw in electronic hotel locks and a major NATO cyber security exercise. Hello and welcome to the IT Governance podcast for Friday, 27 April 2018. Here are this week’s stories. TSB’s chief executive Paul Pester has said the bank is on its knees after a botched system upgrade caused chaos this week, leaving around half of its customers unable to access their accounts – although some were able to access other people’s.

article thumbnail

SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies

Threatpost

The gang behind the Atlanta city shutdown and other attacks is selecting victims carefully and offering volume discounts to unlock whole organizations.

article thumbnail

Weekly Update 84

Troy Hunt

This week. I'm tired. A two-day remote workshop on London hours meant very unfriendly times for me here in Aus but hey, it beats jet lag! So just a very short intro this time, I recorded the update this morning whilst I was rather a lot more awake so I'll let that do the talking. Enjoy! iTunes podcast | Google Play Music podcast | RSS podcast. Reference.

Cloud 48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

More Than 1M Children Victims of Identity Fraud in 2017

Dark Reading

Total fraud against kids amounted to $2.6 billion and more than $540 million in out-of-pocket costs to families, a new report finds.

57
article thumbnail

Achieve GDPR compliance with our software tools

IT Governance

General Data Protection Regulation (GDPR) compliance should be a priority and high on every organisation’s agenda with less than two months until the regulation comes into effect on 25 May 2018. Organisations need to be aware of what data they process and ensure it is processed in accordance with the law. As part of a GDPR compliance project, organisations must document their data processes, which can be done by mapping their data and information flows.

GDPR 45
article thumbnail

Visit OpenText at the Salesforce World Tour in May

OpenText Information Management

This blog is updated from a post originally published on Feb 23, 2018. We are just days away now from a busy few weeks for Salesforce, its customer and partners. The next stop on their World Tour event is Toronto on May 3rd followed quickly by London on the 17th and OpenText™ will be there … The post Visit OpenText at the Salesforce World Tour in May appeared first on OpenText Blogs.

article thumbnail

Introducing Digital Collections: An Access and Preservation Platform

Preservica

In celebration of Preservation Week, University of Mary Washington Libraries is announcing the release of a new digital preservation and access platform powered by Preservica. "In celebration of Preservation Week, UMW Libraries is excited to announce the release of a new digital preservation and access platform, Special Collections and University Archives: Digital Collections , powered by Preservica.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Payment Fraud Data: Shifting Trends and Rising Problems

Rippleshot

Across the payments ecosystem, fraud continues to be the increasingly complex and expensive problem that all financial institutions are attempting to tackle. To understand how payment fraud is evolving, FIs must identify the origin of the problem itself. A new report by Javelin dove into leading card fraud trends, the greatest threats to financial institutions and what strategies can help curb the rise of payment fraud.

40
article thumbnail

ZOLL Medical utilizes OpenText Fax Solutions for fast and secure transmission of patient health information

OpenText Information Management

How do you ensure you can quickly and securely get the right patient health information into the right hands? For ZOLL Medical Corporation, a leader in medical devices, the answer was to leverage the enterprise fax solutions from OpenText™ – OpenText RightFax Connect. ZOLL Medical’s LifeVest, the world’s first and only wearable defibrillator, is worn … The post ZOLL Medical utilizes OpenText Fax Solutions for fast and secure transmission of patient health information appeared first o

article thumbnail

Sometimes it’s lonely being a robot

MIKE 2.0

I’m committed to be a global citizen but, living in Australia, I simply can’t get to as many meetings around the world as my role would ideally involve. To deal with this, I find other ways to participate. The myriad of technologies available today, including video conferencing and telepresence robots (think an iPad sitting on top of a remote-controlled Segway), has made this much easier than any time in the past.

IT 40
article thumbnail

Uber Tightens Bug Bounty Extortion Policies

Threatpost

Uber is tightening policies around its bug bounty program after a 2016 data breach exposed deep flaws in its policies around handling extortion.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Reno Man Created 8,000 Fake Online Accounts via Stolen Identities

Dark Reading

Kenneth Gilbert Gibson pleaded guilty to creating more than 8,000 fraudulent online accounts to launch a $3.5M fraud operation.

46
article thumbnail

Why Avast Gives Security Software Away for Free

eSecurity Planet

VIDEO: Ondrej Vlcek, CTO of Avast, discusses how his company's business model works and why machine learning for anti-virus technology is here to stay.

article thumbnail

Organizations gaining new benefits by automating data engineering

Information Management Resources

A number of advancements have now decreased data preparation time while increasing the time available for exploration and applications.