Fri.Aug 24, 2018

article thumbnail

Threat Intelligence: Beyond Indicators of Compromise

Data Breach Today

Trustwave's Brian Hussey on Creating True, Actionable Intel Too many organizations leverage advanced threat intelligence merely to detect indicators of compromise. But Brian Hussey of Trustwave wants to help them mine actionable threat intelligence to truly bolster enterprise defenses.

Mining 173
article thumbnail

Physical Security Product Review – Portable Door Locks (PDLs) – Rishon Addalock VS. MasterBolt Travel Door Lock Security, Compared

Architect Security

Introduction I travel a lot, sometimes alone. I have left hotels almost immediately after checking in because I felt unsafe with the accommodations. Sometimes a hotel will assign a room to two people by mistake, and one person walks in on the other using a valid key (I’ve seen this happen). RFID “hotel master keys” exist. […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Case for Model-Driven Security

Data Breach Today

Aetna CSO Jim Routh on Why We Need a Whole New Approach to Cybersecurity Security thought leaders have long called for organizations to shift from a conventional "peacetime" view of cybersecurity to more of a "wartime" mindset. Aetna CSO Jim Routh now says it's time for enterprises to shift from conventional to unconventional security controls.

Security 100
article thumbnail

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. This post summarizes the highlights from this meeting. 1. NAIC Continues its Evaluation of Insurers’ Use of Big Data . The NAIC is continuing its review of property and casualty insurers’ use of predictive modeling in rate filings and is developing related guidance materials for states to use in reviewing predictive models.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Records Snooping Alleged in Tragic Death of Toddler

Data Breach Today

Lawsuit Alleges Hospital Cafeteria Workers Accessed Child's Records A tragic accident involving the drowning of a young boy also turned into a privacy breach nightmare for the toddler's adoptive parents, a lawsuit filed against an Oklahoma county hospital alleges.

Privacy 100

More Trending

article thumbnail

Has the Ship Sailed on Securing Midterm Elections?

Data Breach Today

Leading the latest edition of the ISMG Security Report: An analysis of why it may be too late to secure the 2018 U.S. midterm elections. Also: A close look at the Anthem breach lawsuit settlement and a report on ransomware recovery lessons learned.

Security 100
article thumbnail

Pro tips for the new MacBook Pro

Jamf

Have questions about the new Apple T2 chip and what it means for your Mac deployment workflows? Read this article for answers.

IT 72
article thumbnail

Google Suspends YouTube Accounts, Content Linked to Iran

Data Breach Today

'State-Sponsored' Phishing Activity Alert Follows Facebook and Twitter Warnings Google has suspended multiple YouTube channels and videos, as well as blogs, after tying them to phishing attacks and influence operations linked to Iran's state media. The technology giant's moves coincided with similar efforts by Facebook and Twitter.

Phishing 100
article thumbnail

Judge Grants Final Approval of Record Data Breach Settlement in Anthem Class Action

Hunton Privacy

On August 15, 2018, U.S. District Judge Lucy Koh signed an order granting final approval of the record $115 million class action settlement agreed to by Anthem Inc. in June 2017. As previously reported , Judge Koh signed an order granting preliminary approval of the settlement in August 2017. The settlement arose out of a 2015 data breach that exposed the personal information of more than 78 million individuals, including names, dates of birth, Social Security numbers and health care ID numbers.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Threat Hunting: How to Evolve Your Incident Response

Data Breach Today

Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting,

Security 100
article thumbnail

T-Mobile data breach exposed personal information of up to 2 million customers

Security Affairs

T-Mobile today announced It has suffered a security breach that May have exposed personal information of up to 2 million T-mobile customers. According to the telco giant, the incident affected its US servers on August 20, leaked information includes customers’ name, billing zip code, phone number, email address, account number, and account type (prepaid or postpaid).

article thumbnail

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers

Data Breach Today

Cloud 100
article thumbnail

A new Cross-Platform Mirai Variant appeared in the wild

Security Affairs

A new cross-platform Mirai variant appeared in the threat landscape, this one has been created using an open-source project. Security experts from Symantec have spotted a new cross-platform Mirai variant that has been created with an open-source project. Mirai malware first appeared in the wild in 2016 when the expert MalwareMustDie discovered it in massive attacks aimed at Internet of Things (IoT) devices.

IoT 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API

Threatpost

T-Mobile alerts millions of its customers to a breach of its website that resulted in subscriber names, zip codes, phone numbers, email addresses and account numbers being stolen.

article thumbnail

The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach

Security Affairs

The restaurant chain Cheddar’s Scratch Kitchen suffered a payment card breach, hackers hacked the company network between Nov. 3, 2017 and Jan. 2, 2018. Once again here we are to discuss of a data breach suffered by a restaurant chain this time the victim is Cheddar’s Scratch Kitchen. The news has been confirmed by the company that was informed of the data breach this month.

article thumbnail

P3iD Technologies premieres capture platform at Capture 2018

Info Source

Silicon Valley, CA- August 23, 2018: P3iD Technologies , a company providing secure hybrid business workflow solutions, today announced that it will premiere its Business Efficiency Center (BEC) capture platform at the Harvey SpencerAssociates’ Capture 2018 conference in Glen Cove, NY, September 5-6, 2018. The Capture 2018 event is the conference where you can meet and talk with the leaders and decision makers and thought leaders of this industry.

article thumbnail

FTC to Commence Hearings on Competition and Consumer Protection in the 21st Century

Hunton Privacy

The Federal Trade Commission announced the opening dates of its Hearings on Competition and Consumer Protection in the 21st Century, a series of public hearings that will discuss whether broad-based changes in the economy, evolving business practices, new technologies or international developments might require adjustments to competition and consumer protection law, enforcement priorities and policy.

IT 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Half of Small Businesses Believe They're Not Cybercrime Targets

Dark Reading

New SMB version of the NIST Cybersecurity Framework could help these organizations properly assess and respond to their security risks.

article thumbnail

National Women's Equality Day a reminder of inequality in cybersecurity

Information Management Resources

August 26 is dedicated to celebrating women’s equality nationally. But when it comes to the cybersecurity field, how can we celebrate when the lack of women in the tech and data security sectors is so plainly evident.

article thumbnail

What We Now Know About Iran's Global Propaganda Campaign

WIRED Threat Level

For years, Iran has run its own secret infowar—running a remarkably similar playbook as Russia.

IT 61
article thumbnail

Weekly Update 101

Troy Hunt

Home! I got up early today to a balmy 16-degree winter's day as we approach the last week before spring and felt genuinely thankful to be in this location. I've gotta stay home more. This week, there's no new blog posts due to travel commitments so it's a bit shorter, but there's still the usual array of goings on. I update how the Mozilla testing with HIBP is going, I'm going to update my Ubiquiti network at home and I get a bit cranky about people installing spyware on other people's phones.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

12 top reference data management providers

Information Management Resources

Collibra, Informatica, Orchestra Networks and Teradata are among the firms offering top reference data management products, according to the MDM Institute.

MDM 52
article thumbnail

Tod Chernikoff, #InfoGov18 Speaker Interview Series

IG Guru

We’re pleased to bring you a series of interviews with some of the presenters at The Information Governance Conference 2018. The Information Governance Conference is the premier event focused on the practice of Information Governance – the high level and coordinating policies and practices applied across all organizational information. The Conference, going into its’ fifth […].

article thumbnail

NYC is the capital of a booming artificial intelligence industry

Information Management Resources

From Silicon Valley to Wall Street, there’s increasing demand for highly-skilled workers in artificial intelligence and machine learning. But there’s a limited pool of talent, and viable candidates who smell the desperation are putting a high price on their skills.

article thumbnail

Pittsburgh is the only city in Pennsylvania without a record retention policy. Here’s why that matters.

IG Guru

J. Dale Shoemaker | July 30, 2018 Suppose your favorite parking spot was replaced by a bike lane—and now you must park around the block to make room for the cyclists’ right-of-way. As a resident, you may wonder how much the city of Pittsburgh paid to have that bike lane installed and how it came about. Is […]. The post Pittsburgh is the only city in Pennsylvania without a record retention policy.

IT 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Banks Warned About ATM Cash-Out Schemes

Rippleshot

As if financial institutions didn’t have enough fraud problems to worry about, there appears to be another growing trend in the hacker ecosystem that’s caught the attention of the FBI: ATM cash outs. Like most fraud trends, ATM cash outs aren’t a new phenomenon, but they have been getting national attention this month after it was reported that cybercriminals are likely in the works to commit a global fraud scheme that’s commonly referred to as an ATM cash-out.

article thumbnail

New law imposes disclosure requirements on software licensors

Data Protection Report

As a result of the 2019 National Defense Authorization Act, the Secretary of Defense implemented new disclosure obligations on software licensors whose software code has been reviewed or accessed by a foreign government. The Act was signed into law on August 13, 2018 and will significantly impact software licensors who engage with the federal government’s defense agencies relating to “obligations to foreign governments.”.

FOIA 40
article thumbnail

Researcher Cracks San Francisco's Emergency Siren System

Dark Reading

Bastille researcher Balint Seeber discusses the process of creating SirenJack and cracking one of a city's critical safety systems.

47