Mon.Sep 16, 2019

Preventing PTSD and Burnout for Cybersecurity Professionals

Dark Reading

The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues

Brokerage Firm Hit With $500,000 Data Breach Penalty

Data Breach Today

Commission Finds That Phillip Capital Made Series of Missteps The U.S. Commodity Futures Trading Commission has hit Philips Capital Inc.,

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

SHARED INTEL: How digital certificates could supply secure identities for enterprise blockchains

The Last Watchdog

Blockchain gave rise to Bitcoin. But blockchain is much more than just the mechanism behind the cryptocurrency speculation mania.

Life After Snowden: US Still Lacks Whistleblowing Rules

Data Breach Today

Intelligence Community May Be Incubating Snowden 2.0, Former NSA Employee Warns Ahead of the release of Edward Snowden's memoirs chronicling his decision to bring illegal "big data" domestic U.S. surveillance programs to light, a former NSA intelligence specialist points out that the U.S. still lacks a whistleblowing law to protect intelligence workers who spot illegal activity

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

A flaw in LastPass password manager leaks credentials from previous site

Security Affairs

A flaw in LastPass password manager leaks credentials from previous site. An expert discovered a flaw in the LastPass password manager that exposes login credentials entered on a site previously visited by a user.

More Trending

After Six Years in Exile, Edward Snowden Explains Himself

WIRED Threat Level

In a new memoir and interview, the world’s most famous whistle-blower elucidates as never before why he stood up to mass surveillance—and his love for an internet that no longer exists. Backchannel Security

MobiHok RAT, a new Android malware based on old SpyNote RAT

Security Affairs

A new Android malware has appeared in the threat landscape, tracked as MobiHok RAT, it borrows the code from the old SpyNote RAT. Experts from threat intelligence firm SenseCy spotted a new piece of Android RAT, dubbed MobiHok RAT, that used code from the old SpyNote RAT.

Sales 109

How a PIA Can CYA

Dark Reading

More than a compliance mandate, privacy impact assessments can also spot risks early in the product development cycle

France and Germany will block Facebook’s Libra cryptocurrency

Security Affairs

Bad news for Facebook and its projects, France and Germany agreed to block Facebook’s Libra cryptocurrency , the French finance ministry said.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Another Side Channel in Intel Chips

Schneier on Security

Not that serious, but interesting : In late 2011, Intel introduced a performance enhancement to its line of server processors that allowed network cards and other peripherals to connect directly to a CPU's last-level cache, rather than following the standard (and significantly longer) path through the server's main memory.

Cloud 98

Data leak exposes sensitive data of all Ecuador ‘citizens

Security Affairs

Experts discovered a huge data leak affecting Ecuador, maybe the largest full-country leak, that exposed data belonging to 20 million Ecuadorian Citizens. Security experts at vpnMentor have discovered a huge data leak affecting Ecuador that exposed data belonging to 20 million Ecuadorian Citizens.

US Turning Up the Heat on North Korea's Cyber Threat Operations

Dark Reading

Sanctions on North Korean nation-state hacking groups came amid reports of fresh malicious campaigns directed at US entities from the isolated nation

85

Fraudulent purchases of digitals certificates through executive impersonation

Security Affairs

Experts at ReversingLabs spotted a threat actor buying digital certificates by impersonating legitimate entities and then selling them on the black market.

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Oracle Expands Cloud Security Services at OpenWorld 2019

Dark Reading

The company broadens its portfolio with new services developed to centralize and automate cloud security

Cloud 78

Four Skills Every Modern Records Manager Must Have Right Now

AIIM

It's become trite to note the speed at which technology changes, and that the speed of those changes continues to increase. But just because it's trite doesn't mean it's not true. This means that, for records managers to continue to remain relevant, we need to ensure that we are on top of new developments in records and information management that will significantly impact our organizations. I wrote about individual professional development plans in another post.

Data Leak Affects Most of Ecuador's Population

Dark Reading

An unsecured database containing 18GB of data exposed more than 20 million records, most of which held details about Ecuadorian citizens

77

Keys to surviving and thriving in the age of digital transformation

Information Management Resources

In his new book, author Thomas M. Siebel stresses that organizations that can truly harness the power of data extract its value by leveraging the cloud, AI, and IoT will master the new digital land. Digital transformation Data strategy Data management

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Court Rules In Favor of Firm 'Scraping' Public Data

Dark Reading

US appeals court said a company can legally use publicly available LinkedIn account information

76

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

Threatpost

ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.

ARMA InfoCon 2019: Schedule Now Online

IG Guru

Check out the schedule online [link]. The post ARMA InfoCon 2019: Schedule Now Online appeared first on IG GURU. ARMA Education InfoGovCon Information Governance information privacy information security Record Retention Infocon2019

Marketing Analytics Company Leaks Deep Profiles of Entire Ecuador Population

Threatpost

Julian Assange is among those impacted

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

New Breach Exposes an Entire Nation: Living and the Dead

Adam Levin

A misconfigured database has exposed the personal data of nearly every Ecuadorian citizen, including 6.7 million children. The database was discovered by vpnMentor and was traced back to Ecuadorean company Novaestra. It contained 20.8

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

Threatpost

Independent researchers found 125 different CVEs across 13 different router and NAS models. IoT Mobile Security Vulnerabilities Web Security ASUS Independent Security Evaluators Lenovo NAS network attacked storage pen testing remote attackers Routers security flaws vulnerabilities

IoT 91

5 Key Updates from Day 1 of Oracle OpenWorld 2019

Perficient Data & Analytics

Today, Mon Sept 16, was day 1 of Oracle OpenWorld. It was a busy day filled with a full set of sessions across all of Oracle’s technology pillars. Outlined are 5 key updates from day 1: Oracle has made significant investments in its Gen 2 Cloud infrastructure.

Is There a Hacker in Your Wallet? Third Certainty Episode 2

Adam Levin

In the second episode of Third Certainty, Adam Levin explains how consumers can protect themselves in the aftermath of the Capital One data breach. The post Is There a Hacker in Your Wallet? Third Certainty Episode 2 appeared first on Adam Levin.

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks

Threatpost

Three North Korean threat groups have been sanctioned in the U.S. as part of a larger U.S. initiative against North Korea-linked malicious cyber activity.

New guidance available to help improve cyber recruiting

Information Management Resources

The Healthcare and Public Health Sector Coordinating Council has released a new toolkit to help a variety of healthcare organizations recruit and retain cybersecurity personnel. Cyber security Recruiting tools Workforce management Recruiting

2019-2020 RMS Steering Committee, part 2

The Schedule

There’s been one final shift in the make-up of this year’s steering committee for the Records Management Section — Ingi House will be completing the remainder of Holly Dolan’s term through August 2021.