Thu.Mar 22, 2018

article thumbnail

The Financial Fallout From Data Breaches

Data Breach Today

Banner Health Follows Nuance, Merck in Reporting Details About the Impact Recent financial reports from three healthcare sector organizations that suffered cyberattacks demonstrate how costly data breaches can be for not-for-profit healthcare providers and for-profit companies alike.

article thumbnail

Whatever the future of payments, you can trust in a lack of trust

Thales Cloud Protection & Licensing

This blog was originally published on Business Reporter. To view the article, please click here. To see where the future of payments lies, we should look to its past. The concept of payment, at its most fundamental, is simply about people agreeing to exchange goods or services. A fair trade of one thing for another. Go back a few thousand years and the invention of money meant that food could be effectively turned into metal and stored for as long as needed, before being turned back into food ag

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Growing Threat from Multi-Vector DDoS Attacks

Data Breach Today

Multivector distributed denial-of-service attacks are having a bigger impact than simple volumetric attacks, says Brian McCann, president of Netscout's security business unit, who analyzes the latest trends in an in-depth interview.

Security 136
article thumbnail

How modern RIM professionals are staying relevant – Part 1

TAB OnRecord

Many RIM professionals that we speak with struggle to obtain budget and attention within the organization. Why? One of the reasons is that RIM has traditionally been seen as a cost center: an expense to be minimized, rather than a value-add or investment. When this mindset prevails among top executives, RIM professionals can struggle to [.] Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Will Congress Lose Midterm Elections to Hackers?

Data Breach Today

Bill Seeks $380 Million for States, But DHS Says Most Lack Security Clearances States will not have the full range of much-needed cybersecurity practices and equipment in place for this year's U.S. midterm elections. But efforts underway might deliver many much-needed improvements in time for the 2020 elections, Homeland Security Secretary Kirstjen Nielsen tells a Senate committee.

More Trending

article thumbnail

A Cyber Espionage Group Re-Emerges

Data Breach Today

FireEye Describes Campaign by Suspected Chinese Actors; Is Asia Next Target? A group of suspected Chinese cyber espionage actors, dubbed TEMP.Periscope or Leviathan, has re-emerged, targeting the maritime industry as well as others, according to a report from FireEye. Many of those targeted have connections to the South China Sea.

111
111
article thumbnail

Minister forced to change his own app after data-mining complaints

The Guardian Data Protection

Culture secretary Matt Hancock said app designed to engage with constituents was changed after criticism that it was harvesting data The culture secretary, Matt Hancock, has been forced to change the settings on his own app after complaints that it was harvesting the data and photos of users. Speaking to ITV’s Good Morning Britain after criticising Facebook for breaching the privacy of millions of its users, Hancock admitted he received complaints about the way his own app accessed users’ data.

Mining 90
article thumbnail

Artificial intelligence in cyber security

IT Governance

Cyber security has become a major priority for every organisation. The right controls and procedures must be put in place to detect potential attacks and protect against them. However, with the risk of a cyber attack increasing every year, how can you keep up with the ever-evolving threats? What is Artificial Intelligence? Artificial intelligence (AI) is the creation of intelligent machines that can learn from experience, allowing them to work and react as a human would.

article thumbnail

Traditional records management isn’t working for government – or anybody else

OpenText Information Management

Government agencies at all levels are realizing traditional records management practices are insufficient and ineffective in a digital world. Why? Digital—and increasingly mobile—citizens are driving the digital transformation of government by demanding new levels of information-based interaction and service More information is being generated by more processes—and it’s often sitting isolated in siloes and repositories … The post Traditional records management isn’t working for government

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Government ‘should have done more’ to prepare organisations for the GDPR

IT Governance

The government hasn’t adequately explained to organisations what the EU General Data Protection Regulation (GPDR) is and how they should prepare, according to 76% of respondents to a new survey by Bitdefender. GDPR Reality Check also found that 52% of respondents believed the media and marketing departments were “guilty of over-hyping the GDPR”. The reported lack of trustworthy guidance has caused confusion, with 26% of respondents saying that they “definitely will not be able to give a concise

GDPR 73
article thumbnail

Think 2018: Our favorite highlights from Thursday

IBM Big Data Hub

Hard to believe we've arrived at the last day of Think 2018. From keynotes to panels, informal collaborations and learning sessions, we've witnessed first-hand the excitement that conversations about data and analytics bring to business.

article thumbnail

Weekly podcast: National Lottery, Russian cyber warfare and Cambridge Analytica

IT Governance

This week, we discuss a credential-stuffing attack on Camelot, heightened fears over Russian cyber attacks and, inevitably, Cambridge Analytica/Facebook. Hello and welcome to the IT Governance podcast for Friday, 23 March 2018. Here are this week’s stories. Camelot has asked all 10.5 million National Lottery account holders to change their passwords after what it described as a low-level cyber attack compromised 150 accounts.

article thumbnail

Today at Think 2018: What you can’t miss Thursday

IBM Big Data Hub

Hard to believe, but we’ve arrived at the final day of Think 2018. It’s been thrilling to be part of the energy flowing through the Cloud & Data Campus. We’ve seen an unprecedented level of engagement around analytics and the future of data-driven decision-making. But we’re not done yet. Here are our top picks for analytics pros today.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

'Tech CEOs are like cult leaders' – the artists taking on Facebook and big data

The Guardian Data Protection

Langlands and Bell are celebrating their 40th year together – by taking an uncompromising look at Silicon Valley’s utopian promises By a remarkable coincidence, on Wednesday, right as Mark Zuckerberg finally addressed the unfolding Facebook data-breach scandal, British artists Ben Langlands and Nikki Bell opened their new exhibition about the unchecked power Facebook and the other big tech companies wield.

article thumbnail

80% of organisations affected by cyber security skills gap

IT Governance

Four out of five organisations can’t find qualified staff to fill cyber security positions, according to CyberEdge’s 2018 Cyberthreat Defense Report. Although this figure is alarmingly high, CyberEdge notes that the skills gap decreased by ten percentage points compared to its 2017 report. The education sector (87.1%) is the most affected, followed by telecommunications and technology (85.1%), manufacturing (81.5%) and finance (81.4%).

article thumbnail

Drupal Forewarns ‘Highly Critical’ Bug to be Patched Next Week

Threatpost

Drupal is giving developers ample time to prepare for an update that patches a “highly critical” flaw because exploits might be developed within hours or days of disclosure.

CMS 58
article thumbnail

Criminals Using Web Injects to Steal Cryptocurrency

Dark Reading

Man-in-the-browser attacks targeting Blockchain.info and Coinbase websites, SecurityScorecard says.

75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple To Fix Glitch Allowing Siri To Read Hidden Messages Out Loud

Threatpost

Apple has confirmed a privacy bug in it iPhone that allows the Siri voice assistant to read out messages from locked screens – even if the messages are hidden.

Privacy 59
article thumbnail

Applications & Identities Initial Targets in 86% of Breaches: Report

Dark Reading

The startling numbers of breached data are sobering: 11.8 billion records compromised in 337 of 433 incidents examined by F5 researchers. They include 10.3 billion usernames, passwords, and email accounts.

article thumbnail

Ninth Circuit Reverses District Court Decision in Zappos Consumer Data Breach Case

Hunton Privacy

On March 8, 2018, the Ninth Circuit Court of Appeals (“Ninth Circuit”) reversed a decision from the United States District Court for the District of Nevada. The trial court found that one subclass of plaintiffs in In re Zappos.Com, Inc. Customer Data Security Breach Litigation , had not sufficiently alleged injury in fact to establish Article III standing.

article thumbnail

Supply Chain Cyberattacks Surged 200% in 2017

Dark Reading

Symantec's annual Internet Security Threat Report also shows that zero-day exploits fizzled and cryptocurrency mining exploded.

Mining 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Weekly Update 79

Troy Hunt

Home again which means more time to blog and per the intro to this week's update, time to catch up on how HIBP is tracking. Here's the 2 tweets with some stats I mention at the start of this week's update: It's been almost a month since I launched Pwned Passwords V2. In that time, @cloudflare has served 156TB from their cache thus keeping the traffic off my origin.

article thumbnail

7 Ways to Protect Against Cryptomining Attacks

Dark Reading

Implementing basic security hygiene can go a long way in ensuring your systems and website don't get hijacked.

article thumbnail

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

March is Women’s History Month, a great time to highlight important contributions made to our country by women. This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. Part I highlights recruitment films from the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Airforce Service Pilots (WASP).

article thumbnail

Hunting Cybercriminals with AWS Honey Tokens

Dark Reading

Researchers at Black Hat Asia demonstrated how they used AWS honey tokens to detect security breaches at scale.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Planes, Trains and Automobiles

RFID Global Solution, Inc.

Planes, Trains and Automobiles – How RFID is Transforming Transportation by Diana Hage In the transportation industry, accurate and reliable data, and tracking via radio frequency identification (RFID) has a wide variety of business critical applications. Here are some highlights of how RFID is being used in the airline, railroad, and automotive industries for improved … Planes, Trains and Automobiles Read More ».

40
article thumbnail

Is Application Security Dead?

Dark Reading

The nature of the field has changed greatly because of the move to the cloud and enterprise digital transformation.

article thumbnail

Facebook-Cambridge Analytica data uproar shines spotlight on trust

Information Management Resources

Organizations should be taking a hard look at how they treat customers and their information, with the goal of earning and keeping their goodwill.