Wed.Jan 10, 2018

article thumbnail

Carphone Warehouse Breach: 'Striking' Failures Trigger Fine

Data Breach Today

Attacker Breached WordPress Installation Outdated by 6 Years Mobile phone retailer Carphone Warehouse has been hit with one of the largest fines ever imposed by Britain's data privacy watchdog after an attacker breached its outdated WordPress installation, exposing 3 million customers' and 1,000 employees' personal details.

Retail 162
article thumbnail

Tammy Mackenzie AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Tammy Mackenzie. Email Tammymackenziee@gmail.com. LinkedIn Profile [link]. Job Title Document Manager. Company Aecon. Please provide one or two points that you will mention during your session. 1) Planning leads to success. 2) Have the Right people, right places, right time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Performance Hit: Meltdown and Spectre Patches Slow Systems

Data Breach Today

Intel, Microsoft and Linux Confirm Slowdowns - Especially For Servers, Older PCs Fixes for the Meltdown and Spectre vulnerabilities are leading to decreased processor performance, triggering cloud service and data center slowdowns. All Windows servers - plus older PCs - as well as Linux servers appear to be experiencing noticeable slowdowns.

Cloud 162
article thumbnail

WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats

WIRED Threat Level

German researchers say that a flaw in the app's group-chat feature undermines its end-to-end encryption promises.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FBI: Encryption Blocked Access to 7,800 Devices

Data Breach Today

Director Calls For 'Responsible' Solution That's Not a Backdoor FBI Director Christopher Wray says the agency was unable to access nearly 7,800 devices in fiscal 2017 because of encryption, which he alleges will pose ever-increasing complications for law enforcement. The FBI doesn't want a backdoor, he says, but rather a "responsible" solution to allow lawful access.

More Trending

article thumbnail

Is ONC's 'Trusted Exchange Framework' Doable?

Data Breach Today

CISOs, CIOs, Weigh the Pros and Cons of ONC's Security Proposals While a draft "trusted exchange framework" unveiled last week by federal regulators includes proposed components that could raise the bar for the security of health data exchange, some experts caution that elements included in the final document should not be overly prescriptive.

Security 113
article thumbnail

Sophisticated cyber attacks are biggest technology concern in 2018

IT Governance

Cyber attacks and breaches are becoming a daily occurrence. In December 2017 we reported that 33.8 million records had been leaked, and in November 2017 there were 59 million records leaked. Targeted attacks by skilled and persistent cyber criminals are now a business reality. Cyber attacks have become more sophisticated and attackers use a variety of tactics: Social engineering: manipulation through phishing, vishing, smishing, etc.

article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. pooja.cs@cgi.com. Wed, 01/10/2018 - 15:25. Ten years ago, I had three devices connected to my home Internet, used intermittently, allowing my family and me to be more efficient, flexible, informed, and entertained. Now, I have 33 devices, collectively connected to the Internet, 24x7.

Mining 78
article thumbnail

Security Beyond The Perimeter

Andrew Hay

Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls that rely solely on broad network-based protection can make the migration of an organization’s systems to private, public, and hy

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Upcoming webinar: GDPR compliance: getting everyone in the organisation on board

IT Governance

Research shows that, despite an increase in awareness, bad habits and irresponsible staff behaviours persist. Yet with little more than six months until the EU General Data Protection Regulation (GDPR) compliance deadline, organisations looking to achieve compliance will be required to create a shift in organisational culture to better support business objectives and tackle bad security habits.

GDPR 68
article thumbnail

Carphone Warehouse fined for 'striking' number of failures that led to data breach

The Guardian Data Protection

Information Commissioner’s Office fines company £400,000 for ‘concerning’ security issues following investigation of hack of 3m customers’ data Carphone Warehouse has been fined £400,000 by the Information Commissioner’s Office for a series of “systemic failures” uncovered following a data breach in 2015. The ICO described the “number of distinct and significant inadequacies in the security arrangements” of Carphone Warehouse as “striking”, and said that it was “ particularly concerning that a n

article thumbnail

CISOs' No. 1 Concern in 2018: The Talent Gap

Dark Reading

Survey finds 'lack of competent in-house staff' outranks all other forms of cybersecurity worry, including data breaches to ransomware attacks.

article thumbnail

FBI Director Calls Smartphone Encryption an ‘Urgent Public Safety Issue’

Threatpost

The debate over the government's authority to access private encrypted data on digital devices was amplified when the Federal Bureau of Investigation Director Christopher Wray called unbreakable encryption an 'urgent public safety issue.'.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Reflections on 5 business-changing IT-related trends in 2017

CGI

Reflections on 5 business-changing IT-related trends in 2017. ravi.kumarv@cgi.com. Thu, 01/11/2018 - 01:20. As 2017 has come to an end, we can reflect on how technology continues to change our lives exponentially. Personally, my life has pivoted a lot this year due to technology. It provided me with a virtual assistant, let me dabble in “alternate” currencies, and of course, on a cold rainy night, let me know what the crowds thought I should binge watch.

article thumbnail

Russian 'Fancy Bears' Hackers Target International Olympic Committee in Latest Email Dump

WIRED Threat Level

A state-linked hacking group is once again trying to discredit antidoping investigators.

article thumbnail

FBI Director: Cryptocurrency, Nation-State Attacks, Among Agency's Top Cybersecurity Concerns

Dark Reading

Speaking at International Conference on Cyber Security, FBI director Christopher Wray pointed to a rise in nation-state attacks - and strong encryption that limits bureau investigations.

article thumbnail

Susan Landau's New Book: Listening In

Schneier on Security

Susan Landau has written a terrific book on cybersecurity threats and why we need strong crypto. Listening In: Cybersecurity in an Insecure Age. It's based in part on her 2016 Congressional testimony in the Apple/FBI case; it examines how the Digital Revolution has transformed society, and how law enforcement needs to -- and can -- adjust to the new realities.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Email archives often overlooked in GDPR compliance efforts

Information Management Resources

Whether it’s from customers, partners or colleagues, organizations collect hundreds, if not thousands, of emails that contain personal information every day.

article thumbnail

FTC Recaps Connected Cars Privacy and Security Workshop

Hunton Privacy

On January 9, 2018, the FTC issued a paper recapping the key takeaways from the FTC’s and National Highway Traffic Safety Administration’s June 2017 workshop on privacy and security issues involving connected cars. The workshop featured representatives from consumer groups, industry, government and academia. Below are some of the key takeaways from the FTC’s paper: Many companies throughout the connected car ecosystem will collect data from vehicles for various purposes, including (1) car manuf

Privacy 48
article thumbnail

'Shift Left': Codifying Intuition into Secure DevOps

Dark Reading

Shifting left is more than a catchy phrase. It's a mindset that emphasizes the need to think about security in all phases of the software development life cycle.

article thumbnail

There’s no “I” in agile implementation: why teams are key

CGI

There’s no “I” in agile implementation: why teams are key. pooja.cs@cgi.com. Wed, 01/10/2018 - 13:21. To achieve agile success, prioritize building the right team before defining the work to be done. To be fair, there are plenty of i’s in agile: innovation, intelligence (human and artificial) and iterations, to name a few. But the contributions of the individuals on a project are less important to its success than the way these individuals are able to interact as a team.

IT 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cisco Adds Encrypted Traffic Analysis Function

Dark Reading

New Encrypted Traffic Analytics is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 4

eDiscovery Daily

As we noted yesterday , Tuesday and Monday , eDiscovery Daily published 78 posts related to eDiscovery case decisions and activities over the past year, covering 62 unique cases ! Yesterday, we looked back at cases related to possession, custody and control, subpoena of cloud provider data, waiver of privilege and the first part of the cases relating to sanctions and spoliation.

article thumbnail

Oracle WebLogic Exploit Used in Cryptocurrency Mining Campaign

Dark Reading

PeopleSoft and WebLogic app servers, as well as cloud systems using WebLogic, hacked and used to net some $226K in digital currency.

Mining 47
article thumbnail

Cybersecurity and the 2017 US National Security Strategy

Schneier on Security

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

'Back to Basics' Might Be Your Best Security Weapon

Dark Reading

A company's ability to successfully reduce risk starts with building a solid security foundation.

article thumbnail

Predictions 2018: The year business doubles down on data protection

Information Management Resources

Organizations will need to address the 'integrity' of information, to ensure that users can best find, understand and trust it.

IT 46
article thumbnail

AWS, Google Cloud Popular Home for Botnet Controllers

Dark Reading

The number of command-and-control listings increase 32% in 2017, with more botnet controllers hosted in the cloud.

Cloud 48