Wed.Apr 03, 2019

article thumbnail

Millions of Facebook Records Found Unsecured on AWS

Data Breach Today

Third-Party Apps Left Facebook Users' Data Accessible in the Cloud Two third-party Facebook application developers exposed users' personal information by leaving the data exposed without a password in unsecured Amazon Web Services S3 buckets, researchers from UpGuard say. One data set contained 540 million unsecured records, the report found.

Passwords 261
article thumbnail

4 Signs Alfresco Is All Growed Up

Weissman's World

Being an information consultant/analyst is a lot like being a parent in that I get to watch companies come into the world, struggle to gain acceptance, and learn to be a force unto themselves (or not). I’m not sure Alfresco yet represents a capital-F force, but after spending two intensive days with their executives, customers, […]. The post 4 Signs Alfresco Is All Growed Up appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Maryland Man Sentenced for Leading $4.2 Million BEC Scheme

Data Breach Today

Nkeng Amin Will Serve Substantial Prison Term A 31-year-old Maryland man will serve time in prison for his leadership role in a business email compromise scheme that netted him and five others $4.2 million from 13 victims over a two-year period.

239
239
article thumbnail

NEW TECH: CloudKnox takes aim at securing identity privileges for humans — and non-humans

The Last Watchdog

Companies are embracing hybrid cloud deployments like never before, mixing and matching on-premises IT systems with off-premises cloud services. Related: Machine identities present wide open attack vector. To accomplish this, they must grant and manage access privileges to human identities: remote employees, third-party suppliers and far-flung customers.

Security 118
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Report: FBI Fails to Promptly Notify Cybercrime Victims

Data Breach Today

Inspect General Cites Numerous Errors in How FBI Makes Notifications The FBI is largely failing to notify cybercrime victims of their rights in a timely manner following a "cyber intrusion," a new report from the U.S. Justice Department's inspector general finds. At times, small errors, such as typographical mistakes, can cause long delays in the notification process.

204
204

More Trending

article thumbnail

Achieving Visibility Without Borders

Data Breach Today

NETSCOUT Arbor's JP Blaho on Understanding Orchestrated Attacks How can an enterprise without a traditional perimeter understand and defend against orchestrated attacks designed to evade detection? JP Blaho of NETSCOUT Arbor offers insights on how to gain visibility.

160
160
article thumbnail

6 Essential Skills Cybersecurity Pros Need to Develop in 2019

Dark Reading

In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.

article thumbnail

Groups Offer Ideas for Improving Healthcare Cybersecurity

Data Breach Today

Recommendations Made in Response to Request by Sen. Mark Warner Several industry groups have offered suggestions - ranging from better cyber information sharing to new regulatory "safe harbors" for entities complying with best practices - in response to Sen. Mark Warner's recent request seeking ideas for improving healthcare sector cybersecurity.

article thumbnail

Experts found 540 Million Facebook user records on unprotected Amazon S3 buckets

Security Affairs

The huge trove of Facebook user data was amassed and stored online on unprotected cloud servers by third-party Facebook app developers. Definitively I can tell you that this is an awful period for Facebook and its users. We first read about an embarrassing incident involving the social network giant that asked some newly-registered users to provide the passwords to their email accounts to confirm their identity … this is absurd.

Archiving 106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Achieve 'Laser-Cut Fraud Prevention'

Data Breach Today

Trusteer's Avner Gideoni on Creating the Perfect Defensive Blend How do machine learning, threat intelligence and advanced analytics blend together to form agile and accurate fraud prevention? Avner Gideoni of IBM Security's Trusteer division explains the concept of "laser-cut fraud prevention.

Analytics 155
article thumbnail

Toyota suffers second data breach in five weeks

IT Governance

Toyota has disclosed a data breach that may have affected up to 3.1 million customers. It’s the second time the car manufacturer has been breached in the last five weeks. In a statement released on 29 March 2019, the organisation confirmed that several of its Asian subsidiaries were targeted by criminal hackers. It said that it is taking the situation seriously and will implement security measures at dealers and the entire Toyota group.

article thumbnail

Hacker Eva Galperin Has a Plan to Eradicate Stalkerware

WIRED Threat Level

Galperin has already convinced Kaspersky to flag domestic abuse spyware as malware. She expects more to follow.

Privacy 112
article thumbnail

Tell a story, create a feeling – thoughts from Micro Focus Universe, 2019

Micro Focus

Ohhh Vienna The world of Enterprise B2B Marketing is always go, go, go and, like planning a vacation, event planning and execution is so intense, we spend months planning, there is the high of the event itself and then it’s over and we are onto thinking about the next one. As I type, our teams. View Article.

B2B 87
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Georgia Tech security breach exposed up to 1.3 million individuals

Security Affairs

The Georgia Institute of Technology (Georgia Tech) announced to have suffered a security breach, “an unknown outside entity” had access to data of up to 1.3 million people. The Georgia Institute of Technology (Georgia Tech) suffered a security breach, on Tuesday it revealed that “an unknown outside entity” had gained unauthorized access to a database that stored the details of 1.3 million individuals.

article thumbnail

OpenText Insights from Gartner Analytics and BI Bake-Off

OpenText Information Management

OpenText™ recently attended the Gartner Data and Analytics Summit in Orlando where their annual Analytics and BI bake-off remains popular. This year, there were actually two bake-offs: one for business intelligence, and one for data science and machine learning. For those of you who aren’t familiar with Gartner’s “bake-off,” it’s a high-stakes competition between analytics … The post OpenText Insights from Gartner Analytics and BI Bake-Off appeared first on OpenText Blogs.

article thumbnail

Third-Party Apps Exposed Over 540 Million Facebook Records

WIRED Threat Level

A cybersecurity firm found that two different third-party Facebook apps left millions of records about users sitting unprotected on Amazon’s servers.

article thumbnail

Is Windows 10 or macOS right for you?

Jamf

To help you make the most beneficial and economical decision ahead of the imminent Windows 7 end of life (EOL), we put together a free e-book that lays out the facts of each option. Read now.

81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Belgian Data Protection Authority Appoints First Commissioner and Directors

Data Matters

On 29 March 2019, the Belgian House of Representatives appointed a new Data Protection Commissioner and four directors to the executive committee of the Belgian Data Protection Authority (‘ DPA ’). These are the first appointments to be made to the DPA since it replaced the previous Belgian Privacy Commission in anticipation of the EU GDPR. This is therefore the first time that executive roles have been officially filled in the context of the regulator’s expanded competence – including the DPA’s

GDPR 68
article thumbnail

Facebook Data of Millions Exposed in Leaky Datasets

Threatpost

Researchers say that two publicly exposed dataset are leaking Facebook data- from user names to plaintext passwords.

article thumbnail

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

Security Affairs

The OceanLotus APT group, also known as APT32 or Cobalt Kitty , leverages a steganography-based loader to deliver backdoors on compromised systems. Security researchers at Cylance discovered that the OceanLotus APT (also known as APT32 or Cobalt Kitty , group is using a loader leveraging steganography to deliver a version of Denes backdoor and an updated version of Remy backdoor.

article thumbnail

Focus on Business Priorities Exposing Companies to Avoidable Cyber-Risk

Dark Reading

Despite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security.

Risk 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Maximize the Value of Your Cybersecurity Investment

Threatpost

Maximizing your security investment starts with hiring the right talent, harvesting data, spotting trends in logs and more.

article thumbnail

The key elements of successful data governance programs

Information Management Resources

The growing adoption of advanced and disruptive technologies, along with greater focus on data value and insights, is putting the spotlight on successful data governance strategies.

article thumbnail

OpenText wins two IABC Gold Quill Awards

OpenText Information Management

We’re thrilled to announce that OpenText™ has been recognized by the International Association of Business Communicators (IABC) with two Gold Quill awards: Special and Experiential Events for the 2018 OpenText Women in Technology Summit and Corporate Social Responsibility for the 2017 Light The Night campaign. For more than 40 years, the IABC Gold Quill Awards … The post OpenText wins two IABC Gold Quill Awards appeared first on OpenText Blogs.

article thumbnail

In Security, Programmers Aren't Perfect

Dark Reading

Software developers and their managers must change their perception of secure coding from being an optional feature to being a requirement that is factored into design from the beginning.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Software security is a global challenge that is slated to grow worse. The application attack surface is growing by 111 billion new lines of software code every year, with newly reported zero-day exploits rising from one-per-week in 2015 to one-per-day by 2021, according to the Application Security Report from Cybersecurity Ventures. Mobile alone has one new application released every 13 seconds.

Paper 52
article thumbnail

Georgia Tech Cyberattack Exposes Data of 1.3 Million People

Dark Reading

Names, addresses, Social Security numbers, and birth dates may have been pilfered in the attack.

article thumbnail

What Equal Pay Day means for women developers and data scientists

Information Management Resources

I’ve reached out to hear what other women in the tech, software and data science fields have to say about the importance of Equal Pay Day and what companies can do to close the wage gap.