Tue.Jul 31, 2018

article thumbnail

Iowa Health Group Data Breach Hits 1.4 Million Patients

Data Breach Today

UnityPoint Health Says Hackers' Likely Goal Was Business Email Compromise Fraud A large Midwestern health network says a successful phishing campaign exposed a raft of personal and medical data stored in its email systems. The count of affected victims numbers 1.4 million, although investigators believe stealing personal data was not the attackers' goal.

article thumbnail

10 More Women in Security You May Not Know But Should

Dark Reading

The second installment in a series highlighting women who are driving change in cybersecurity but may not be on your radar - yet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Removes 'Bad Actors' for 'Inauthentic' Activity

Data Breach Today

Social Media Company Stops Short of Blaming Russians Facebook said Tuesday that it had shut down 32 pages and accounts that it says were "engaged in coordinated inauthentic behavior" apparently designed to influence U.S. politics, but it stopped short of attributing the "bad actors" to Russia.

IT 145
article thumbnail

Interview With Mark Myers on the Texas Digital Archive

The Texas Record

Devices used by Governor Rick Perry to create electronic records [1] This is the first in a two-part series exploring the Texas Digital Archive (TDA) with Electronic Records Specialist Mark Myers of the Archives and Information Services (ARIS) division at TSLAC. Mark is responsible for ingesting electronic records into the TDA. It’s interesting to ponder that just a few years ago TSLAC had no way of receiving and preserving the permanently valuable electronic records of state agencies and legisl

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Trailblazing CISO Stephen Katz Offers Cybersecurity Insights

Data Breach Today

What advice does the world's first CISO have for the current generation of CISOs? Stephen Katz emphasizes, first and foremost, that cybersecurity must be treated as a business risk management issue rather than a technology issue. He'll be a featured speaker at ISMG's Security Summit in New York Aug. 14-15.

More Trending

article thumbnail

Dixons Carphone: 10 Million Records Exposed in 2017 Breach

Data Breach Today

Retailer Revises Breach Impact Upward; 5.9 Million Payment Cards Also Exposed Struggling European electronics giant Dixons Carphone says its investigation into a 2017 data breach has found that 10 million customers' personal details - up from its previous estimate of 1.2 million - were compromised. It previously reported that 5.9 million payment cards were also compromised.

Retail 100
article thumbnail

Understanding keys is key to understanding

Thales Cloud Protection & Licensing

The newest CipherTrust Cloud Key Manager capability. CipherTrust Cloud Key Manager is a multi-cloud encryption key management solution ideal for customers using Microsoft Azure Key Vault , Amazon Web Services Key Management Service , Microsoft Office365 or Salesforce Shield Platform Encryption. Before I talk about the importance of the newest feature of Cipher Trust Key Manager let’s define some terms to get everyone thinking similarly about keys and key management.

article thumbnail

The Last-Ditch Legal Fight to Stop 3-D Printed Guns

WIRED Threat Level

After five years, US lawmakers and law enforcement are starting to fight back against 3-D printed firearms and "ghost guns.".

article thumbnail

CIPL Submits Comments to EDPB’s Draft Guidelines on Certification and Identifying Certification Criteria in Accordance with Articles 42 and 43 GDPR

Hunton Privacy

On July 10, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP submitted formal comments to the European Data Protection Board (the “EDPB”) on its draft guidelines on certification and identifying certification criteria in accordance with Articles 42 and 43 of the GDPR (the “Guidelines”). The Guidelines were adopted by the EDPB on May 25, 2018, for public consultation.

GDPR 56
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hacking a Robot Vacuum

Schneier on Security

The Diqee 360 robotic vacuum cleaner can be turned into a surveillance device. The attack requires physical access to the device, so in the scheme of things it's not a big deal. But why in the world is the vacuum equipped with a microphone?

Access 55
article thumbnail

Facebook Uncovers New Fake Accounts Ahead of Midterm Elections

WIRED Threat Level

The company removed 32 pages and accounts from Facebook and Instagram for “coordinated inauthentic behavior.”.

article thumbnail

FAQ about Records Management Training Changes

National Archives Records Express

We received quite a few questions since announcing the changes that we are making to the Records Management Training Program. Some of the changes will not occur until Fiscal Year 2020; however, there are some changes are just around the corner. In this post, we have answered some of the most frequently asked questions about changes occurring in October.

article thumbnail

Why No HTTPS? Questions Answered, New Data, Path Forward

Troy Hunt

So that little project Scott Helme and I took on - WhyNoHTTPS.com - seems to have garnered quite a bit of attention. We had about 81k visitors drop by on the first day and for the most part, the feedback has been overwhelmingly positive. Most people have said it's great to have the data surfaced publicly and they've used that list to put some pressure on sites to up their game.

IT 50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

SamSam Ransomware operators earned more than US$5.9 Million since late 2015

Security Affairs

The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study. The researchers that have tracked Bitcoin addresses managed by the crime gang discovered that crooks behind the SamSam ransomware had extorted nearly $6 million from the victims since December 2015 when it appeared in the threat landscape. “SamSam has earned its creator(s) more than US$5.9 Million since late 2015. 74

article thumbnail

OpenText™ Blazon and Content Server Rendition Module: Secure, compliant document review from one vendor

OpenText Information Management

What is a “rendition”? A rendition is an item which is closely related to a document or version. A rendition contains the same information as the original document, but presents this information in a different file format. For example, an Excel file can be stored as a rendition-based PDF or TIFF. Renditions are most commonly … The post OpenText™ Blazon and Content Server Rendition Module: Secure, compliant document review from one vendor appeared first on OpenText Blogs.

article thumbnail

Ransomware attack against COSCO spread beyond its US network to Americas

Security Affairs

New revelations on the attack against COSCO confirm it was worse than initially thought, the ransomware spread beyond the US network. Chinese shipping giant COSCO recently suffered a ransomware attack that disrupted some systems of the company in the United States. The shipping company quickly isolates the systems to avoid propagation to other regions and started an internal investigation, the firm confirmed that the incident did not affect operations of the fleet. “After the network secur

article thumbnail

Private health sector most vulnerable to data breaches – report

The Guardian Data Protection

Finance sector is second, with criminal attacks and human error playing significant roles in both sectors The private health and financial sectors suffered more data breaches than any other sector between April and June, with human error a major source of those breaches. The quarterly notifiable data breaches report published by the Office of the Australia Information Commissioner (Oaic) on Tuesday found malicious or criminal attacks accounted for 59% of data breaches, with theft of paperwork or

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The National Risk Management Center Will Combat Critical Infrastructure Hacks

WIRED Threat Level

The National Risk Management Center will give critical infrastructure companies much needed-support when under cyberattack.

Risk 54
article thumbnail

Dixons Carphone Data Breach discovered in June affected 10 Million customers

Security Affairs

Dixons Carphone announced on Monday that the security breach discovered in June affected around 10 million customers, much more than the initial estimate. Dixons Carphone, one of the largest European consumer electronics and telecommunication retailers, suffered a major data breach in 2017 , but new data related to the incident have been shared. The situation was worse than initially thought, the company announced on Monday that the security breach affected around 10 million customers, much more

article thumbnail

Complex Malvertising Scheme Impacts Multiple Levels of Web Economy

Threatpost

A criminal posing as a legitimate website publisher on the AdsTerra online advertising network is using maliciously gathered traffic to deliver victims to exploit kits.

article thumbnail

DHS Establishes Center For Defense of Critical Infrastructure

Dark Reading

Center foundational to new government-led 'collective defense' strategy for sharing and responding to cyberthreats, DHS secretary says.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

HP Offers Up to $10,000 Rewards for Printer Bugs

Threatpost

HP said it has launched the first-ever bug bounty program for printers, with rewards of up to $10,000 for discovered vulnerabilities.

IT 50
article thumbnail

Report shows increase in social engineering

IG Guru

Emma Bordessa 13th July 2018 Proofpoint’s The Human Factor 2018 Report revealed that over the past year, cyber criminals have continued to increase their use of social engineering, building up the number of attacks that rely on human interaction. Social engineering is at the core of many of today’s attacks, seeking to exploit the curiosity of unsuspecting […].

article thumbnail

Exploits in Samsung Hub Put Smart Homes at Risk

The Security Ledger

There is more alarming security news for consumers with smart devices at home: hackers can take remote control of video cameras, thermostats, smart locks or other IoT devices by exploiting vulnerabilities discovered in Samsung’s SmartThings Hub, according to a report by Cisco Systems’ Talos research group. Cisco Talos researchers. Read the whole entry. » Related Stories Expert says: Hack your Smart Home to Secure It Fitness apps: Good for your health, not so much for military se

Risk 40
article thumbnail

EUR 27 Million European Financing for Finnish Software Company M-Files

Info Source

TAMPERE, FINLAND (PRWEB) JULY 19, 2018 – The European Investment Bank (EIB) has signed a EUR 27 million financing agreement with software company M-Files from Tampere, Finland. The loan was made possible by the European Fund for Strategic Investments (EFSI) , central pillar of the Investment Plan for Europe , which was launched by the EIB Group and the European Commission to boost the competitiveness of the European economy.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Secure Access as a Business Accelerator: a Conversation with Pulse Secure

The Security Ledger

In this Security Ledger Conversations Video, we speak with Sudhakar Ramakrishna, the CEO of the firm Pulse Secure on that company’s journey from Juniper Networks’ remote access business unit to a thriving, independent company selling secure access technology to firms with on premises, cloud and mobile deployments. Technology has. Read the whole entry. » Related Stories RSA Labs: cloud, microservices, mobility shift terrain for security providers Report: Cybercriminals target dif

Access 40
article thumbnail

Summer Reading List

Adam Shostack

I’m honored to have my threat modeling book on this short list with Daniel Kahneman, Tony Hsieh, Nicole Forsgren, and Tom DeMarco: “ Summer Reading List: Top Recommendations from our Engineers.

40
article thumbnail

Six challenges to taking a machine learning project to production

Information Management Resources

For machine learning projects, there is a massive difference between generating the input data needed by a model to prove out a concept one time, and the data required to scale it to production.

IT 42