Mon.Sep 16, 2019

Preventing PTSD and Burnout for Cybersecurity Professionals

Dark Reading

The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues

Brokerage Firm Hit With $500,000 Data Breach Penalty

Data Breach Today

Commission Finds That Phillip Capital Made Series of Missteps The U.S. Commodity Futures Trading Commission has hit Philips Capital Inc.,

SHARED INTEL: How digital certificates could supply secure identities for enterprise blockchains

The Last Watchdog

Blockchain gave rise to Bitcoin. But blockchain is much more than just the mechanism behind the cryptocurrency speculation mania.

US Sanctions 3 North Korean Hacking Groups

Data Breach Today

Trump Administration Cites WannaCry, Sony Pictures, Bangladesh Bank Attacks As part of the U.S. government's continuing efforts to highlight the North Korean government's cyberattacks, the U.S.

Groups 216

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

A flaw in LastPass password manager leaks credentials from previous site

Security Affairs

A flaw in LastPass password manager leaks credentials from previous site. An expert discovered a flaw in the LastPass password manager that exposes login credentials entered on a site previously visited by a user.

More Trending

After Six Years in Exile, Edward Snowden Explains Himself

WIRED Threat Level

In a new memoir and interview, the world’s most famous whistle-blower elucidates as never before why he stood up to mass surveillance—and his love for an internet that no longer exists. Backchannel Security

Life After Snowden: US Still Lacks Whistleblowing Rules

Data Breach Today

Intelligence Community May Be Incubating Snowden 2.0, Former NSA Employee Warns Ahead of the release of Edward Snowden's memoirs chronicling his decision to bring illegal "big data" domestic U.S. surveillance programs to light, a former NSA intelligence specialist points out that the U.S. still lacks a whistleblowing law to protect intelligence workers who spot illegal activity

MobiHok RAT, a new Android malware based on old SpyNote RAT

Security Affairs

A new Android malware has appeared in the threat landscape, tracked as MobiHok RAT, it borrows the code from the old SpyNote RAT. Experts from threat intelligence firm SenseCy spotted a new piece of Android RAT, dubbed MobiHok RAT, that used code from the old SpyNote RAT.

Another Side Channel in Intel Chips

Schneier on Security

Cloud 106

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

France and Germany will block Facebook’s Libra cryptocurrency

Security Affairs

Bad news for Facebook and its projects, France and Germany agreed to block Facebook’s Libra cryptocurrency , the French finance ministry said.

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware


ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.

Data leak exposes sensitive data of all Ecuador ‘citizens

Security Affairs

Experts discovered a huge data leak affecting Ecuador, maybe the largest full-country leak, that exposed data belonging to 20 million Ecuadorian Citizens. Security experts at vpnMentor have discovered a huge data leak affecting Ecuador that exposed data belonging to 20 million Ecuadorian Citizens.

Data 111

Marketing Analytics Company Leaks Deep Profiles of Entire Ecuador Population


Julian Assange is among those impacted

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Fraudulent purchases of digitals certificates through executive impersonation

Security Affairs

Experts at ReversingLabs spotted a threat actor buying digital certificates by impersonating legitimate entities and then selling them on the black market.

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs


Independent researchers found 125 different CVEs across 13 different router and NAS models. IoT Mobile Security Vulnerabilities Web Security ASUS Independent Security Evaluators Lenovo NAS network attacked storage pen testing remote attackers Routers security flaws vulnerabilities

IoT 114

How a PIA Can CYA

Dark Reading

More than a compliance mandate, privacy impact assessments can also spot risks early in the product development cycle

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks


Three North Korean threat groups have been sanctioned in the U.S. as part of a larger U.S. initiative against North Korea-linked malicious cyber activity.

Groups 113

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Four Skills Every Modern Records Manager Must Have Right Now


It's become trite to note the speed at which technology changes, and that the speed of those changes continues to increase. But just because it's trite doesn't mean it's not true. This means that, for records managers to continue to remain relevant, we need to ensure that we are on top of new developments in records and information management that will significantly impact our organizations. I wrote about individual professional development plans in another post.

Keys to surviving and thriving in the age of digital transformation

Information Management Resources

In his new book, author Thomas M. Siebel stresses that organizations that can truly harness the power of data extract its value by leveraging the cloud, AI, and IoT will master the new digital land. Digital transformation Data strategy Data management

5 Key Updates from Day 1 of Oracle OpenWorld 2019

Perficient Data & Analytics

Today, Mon Sept 16, was day 1 of Oracle OpenWorld. It was a busy day filled with a full set of sessions across all of Oracle’s technology pillars. Outlined are 5 key updates from day 1: Oracle has made significant investments in its Gen 2 Cloud infrastructure.

#ModernDataMasters: Eduard Yanchevsky, Director Services & Solutions, Keyrus


Kate Tickner, Reltio. Eduard Yanchevsky is a business leader with more than 15 years of experience in consultancy and performance management processes, combining strong analytical, problem-solving and project management skills.

ARMA InfoCon 2019: Schedule Now Online

IG Guru

Check out the schedule online [link]. The post ARMA InfoCon 2019: Schedule Now Online appeared first on IG GURU. ARMA Education InfoGovCon Information Governance information privacy information security Record Retention Infocon2019

New Breach Exposes an Entire Nation: Living and the Dead

Adam Levin

A misconfigured database has exposed the personal data of nearly every Ecuadorian citizen, including 6.7 million children. The database was discovered by vpnMentor and was traced back to Ecuadorean company Novaestra. It contained 20.8

US Turning Up the Heat on North Korea's Cyber Threat Operations

Dark Reading

Sanctions on North Korean nation-state hacking groups came amid reports of fresh malicious campaigns directed at US entities from the isolated nation

New guidance available to help improve cyber recruiting

Information Management Resources

The Healthcare and Public Health Sector Coordinating Council has released a new toolkit to help a variety of healthcare organizations recruit and retain cybersecurity personnel. Cyber security Recruiting tools Workforce management Recruiting

Oracle Expands Cloud Security Services at OpenWorld 2019

Dark Reading

The company broadens its portfolio with new services developed to centralize and automate cloud security

Cloud 86

Is There a Hacker in Your Wallet? Third Certainty Episode 2

Adam Levin

In the second episode of Third Certainty, Adam Levin explains how consumers can protect themselves in the aftermath of the Capital One data breach. The post Is There a Hacker in Your Wallet? Third Certainty Episode 2 appeared first on Adam Levin.