Tue.Nov 28, 2017

article thumbnail

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales Cloud Protection & Licensing

At Thales eSecurity we are always eager to obtain data on how the world perceives threats to personal data, because it has the potential to inform us on how to make our everyday lives more safe and secure. Together with an independent firm, we recently conducted a survey of 1,000 consumers across the U.S. and UK and found that ownership of internet-connected cars is on the rise.

Security 103
article thumbnail

North Korea’s Missile Test Puts the Entire US in Range

WIRED Threat Level

The bad news: Tuesday's missile test shows that North Korea's ICBM can likely hit the US. The slightly less bad news: It's still a long way off from actually doing so.

IT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How the PCI DSS can help you meet the requirements of the GDPR

IT Governance

With less than 6 months until the General Data Protection Regulation ( GDPR ) is enforced, organisations across Europe must consider how the far-reaching changes introduced by the Regulation will affect how they handle and protect personal data. While some will be worried about how to comply with the new law, those that are already compliant with the Payment Card Industry Data Security Standard (PCI DSS) – or are moving towards compliance – have a head start and can use their existing PCI compli

GDPR 85
article thumbnail

How Bots Broke the FCC's Public Comment System During the Net Neutrality Debate

WIRED Threat Level

The FCC's net neutrality public comment period was overrun with bots, making it all but impossible for any one voice to be heard. That's not how this is supposed to work.

IT 96
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Spreading OpenText cheer: the Philippines

OpenText Information Management

The holidays are fast approaching and our OpenText colleagues are starting to get festive in their offices around the world, In this post, OpenText employees Aileen Cacatian, Daryl Ancheta, Michelle Maquiso, Keith James Macapagal and Maria Cristine Sarmiento from the DGO Manila Team write about their favourite customs and traditions during the holiday season in … The post Spreading OpenText cheer: the Philippines appeared first on OpenText Blogs.

75

More Trending

article thumbnail

Compliant data freedom: Oxymoron or opportunity?

IBM Big Data Hub

Many large organizations still have a large amounts of data on-premise, but also need data from a public cloud. Regardless of where the data resides, organizations can build a trusted data source from which they can drive key business insights and derive significant sustained advantages. Here's how.

Cloud 74
article thumbnail

Ten things impacting the world: climate change

OpenText Information Management

The burning of fossil fuels and other activities have released enormous amounts of gases into the atmosphere. These emissions have warmed the Earth’s surface, and the oceans have absorbed 80 percent of this additional heat. As the ocean warms, the density decreases and the volume of the ocean increases. This is called thermal expansion and … The post Ten things impacting the world: climate change appeared first on OpenText Blogs.

article thumbnail

Man-in-the-Middle Attack against Electronic Car-Door Openers

Schneier on Security

This is an interesting tactic, and there's a video of it being used: The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull on 24 September, has not been recovered. In the footage, one of the men can be seen waving a box in front of the victim's house. The device receives a signal from the key inside and transmits it to the second box next to the car.

IT 68
article thumbnail

IoT Security: The Basics

Outpost24

This piece is part 1 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.

IoT 58
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Accepting Public Comment on Proposed Revisions to Local Schedule SD

The Texas Record

We are accepting public comment on proposed revisions to Local Schedule SD. The proposed revisions were published in the November 24th issue of the Texas Register. The copy of the schedule posted in the Texas Register is a clean version of the schedule and does not show all revisions. To aid in your review, you can view a marked up version of the schedule on our website.

article thumbnail

Critical Apple Login Bug Puts macOS High Sierra Systems at Risk

Threatpost

A major bug in Apple’s macOS High Sierra gives anyone with physical access to a system running the latest version of the OS root access simply by putting "root" in the user name field.

Risk 55
article thumbnail

Take part in the ISO 27001 Global Survey and you could win a £350 voucher

IT Governance

IT Governance has launched its 2017 ISO 27001 Global Survey to establish the benefits, drivers and challenges experienced by ISO 27001 implementers globally. The survey, now in its third year, is also designed to provide insights into the changing information security and data security compliance landscapes. 2016 ISO 27001 Global Survey key findings: 69% of respondents said that the main driver for implementing ISO 27001 was to improve their organisation’s information security posture. 51% of re

article thumbnail

Australia Announces Plans to Participate in APEC Cross-Border Privacy Rules

Hunton Privacy

On November 23, 2017, the Australian Attorney-General’s Department announced that it will move forward with an application to participate in the APEC Cross Border Privacy Rules (“CBPR”) system. The announcement follows comments received from a July 2017 consultation by the Australian Government regarding the implications of Australia’s possible participation in the system.

Privacy 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The 3 most important data metrics for retaining customers

Information Management Resources

In an era where every customer is valuable, it’s important to use information to more deeply understand the most profitable and high-growth segments and tailor the business to them.

55
article thumbnail

The Looming War of Good AI vs. Bad AI

Dark Reading

The rise of artificial intelligence, machine learning, hivenets, and next-generation morphic malware is leading to an arms race that enterprises must prepare for now.

article thumbnail

Leaky AWS Storage Bucket Spills Military Secrets, Again

Threatpost

For the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online.

article thumbnail

Suspect in Yahoo Breach Case Pleads Guilty

Dark Reading

Karim Baratov admits he worked on behalf of Russia's FSB.

83
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Blog Post: Saudi Vision 2030

Schneier on Security

By David Gurteen I've just spent a few days in Riyadh where I gave a talk and run a Knowledge Café as part of a KM Forum entitled "Knowledge Management Utilization in Realizing Saudi Vision 2030" organized by the Naseej Academy. Saudi Vision 2030 is a plan to reduce Saudi Arabia's dependence on oil, diversify its economy, and develop public service sectors such as health, education, infrastructure, recreation, and tourism.

article thumbnail

HazyBits Joins TWAIN Working Group as an Associate Member

Info Source

Raleigh, NC – November 28, 2017 – The TWAIN Working Group (TWG), a not-for-profit organization designed to provide and foster a universal public standard which links applications and image acquisition devices, today announced the addition of HazyBits as an Associate member of the TWAIN Working Group. HazyBits, a developer of carefully designed APIs that provide infrastructure for developers of modern applications to process huge amounts of data, has joined to make development contri

Cloud 40
article thumbnail

Russia Partially Releases 2018 Data Privacy Inspection Plans

HL Chronicle of Data Protection

Two weeks ago, certain territorial divisions of the Russian Data Protection Authority, Roskomnadzor, published their 2018 plans for conducting inspections of local companies’ compliance with Russian data privacy requirements, including with Russia’s data localization requirement. The inspection plans contain a number of prominent multi-national and Russian companies.

article thumbnail

Git Some Security: Locking Down GitHub Hygiene

Dark Reading

In the age of DevOps and agile development practices that lean heavily on GitHub and other cloud resources, strong controls are more important than ever.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Detects and Boots Tizi Spyware Off Google Play

Threatpost

Google discovered a spyware app that uses nearly a dozen old vulnerabilities to root devices and steal sensitive data from social media applications.

Privacy 43
article thumbnail

Uber’s Response to Data Breach? Pay the Hackers to Keep Quiet About It: Cybersecurity Trends

eDiscovery Daily

Hackers stole the personal data of 57 million customers and drivers from Uber last year. Their response? Conceal the breach for more than a year, and pay the hackers $100,000 to delete the data (sure they did) and keep quiet about the breach. As reported on Bloomberg ( Uber Paid Hackers to Delete Stolen Data on 57 Million People , written by Eric Newcomer) last week, compromised data from the October 2016 attack included names, email addresses and phone numbers of 50 million Uber riders around

article thumbnail

Fortinet Enhances Its Cloud Security Portfolio as Threat Landscape Continues to Shift

eSecurity Planet

Fortinet reports that 35 percent of organizations it monitored were attacked with the Apache Struts vulnerability in the third quarter of 2017.

IT 40
article thumbnail

Retail and Hospitality Breaches Declined Over Past 2 Years

Dark Reading

A drop in publicly disclosed breaches for the two industries is due in part to fewer point-of-sale breaches.

Retail 46
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

U.S. Justice Department: Chinese Hackers Hit Siemens, Moody's, Trimble

eSecurity Planet

Three Chinese nationals are alleged to have run a six-year campaign aimed at stealing corporate data.

40
article thumbnail

Trend Micro Buys Immunio

Dark Reading

The acquisition is aimed at balancing the speed of DevOps with application security.

article thumbnail

The secret to reeling in cybersecurity talent at three big banks

Information Management Resources

One estimate says 3.5 million cybersecurity jobs will go unfilled by 2021. Banks are looking to military veterans, universities and even high schools to help fill the gap.