Wed.Feb 21, 2018

article thumbnail

Australia's New Payments Platform: Privacy Concerns

Data Breach Today

Pro: Payment System Confirms Recipient Information. Con: It Could Be Abused Australia's real-time payments platform, which launched last week, includes a feature designed to reduce fraud and erroneous payments. Ironically, the feature may also expose users to social engineering attacks.

Privacy 113
article thumbnail

Information Security and Compliance Through the Prism of Healthcare and Retail

AIIM

Organizations must focus strategically on how to manage digital content and understand that: 1) end-users are consuming technology differently; 2) consumer devices are being increasingly used as “on-ramps” to digital workflows; and 3) how you secure the scan and capture process becomes increasingly important. Let’s explore how these concepts relate to two specific industries – healthcare and retail. 1 -- Healthcare at the practice level illustrates the challenges of matching small business IT re

Retail 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Making Security Technology Purchase Decisions

Data Breach Today

How can organizations decide what security technologies best meet their needs? CISO Mark Eggleston shares his tips for making the right purchase decisions.

Security 113
article thumbnail

WhatsApp Co-Founder Brian Acton Injects $50 Million in Newly Formed Signal Foundation

WIRED Threat Level

WhatsApp co-founder Brian Acton has taken on the leadership of the non-profit behind that popular encryption app—and given it a serious injection of cash.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mitigating the Insider Threat: Lessons From Indian Fraud Case

Data Breach Today

After PNB Incident, Security Practitioners Discuss Technologies to Mitigate Risks Now that it's been confirmed that an insider at Punjab National Bank paved the way for $1.8 billion in fraudulent transactions, the Reserve Bank of India is reiterating the need to strengthen security measures tied to SWIFT interbank transactions, and security experts are offering risk mitigation advice.

Risk 100

More Trending

article thumbnail

Key deadlines for the Scottish Public-Sector Action Plan on cyber resilience

IT Governance

Scottish public-sector bodies and their key partners are required to take certain measures to improve cyber security and promote cyber resilience by the end of 2018, according to the Scottish Public Sector Cyber Resilience Framework. If you are a Scottish public body or your organisation deals with the Scottish public sector, and/or you’re looking to align your cyber resilience strategy with government best practice, you need to be aware of these deadlines: End of March 2018.

Paper 85
article thumbnail

National Academy of Sciences Encryption Study

Data Matters

Few would describe 2017 as a quiet year. But it actually was a period of relative calm with respect to at least one important topic. After supporters and opponents of mandated government access to encrypted communications publicly feuded for much of 2016, reprising arguments they’ve had since at least the days of the “Clipper Chip,” these “encryption debates” seemed to quiet down for much of last year.

article thumbnail

How Cyber Essentials plays a key role in cyber resilience strategies

IT Governance

The increasing frequency and severity of cyber attacks means it’s no longer enough to trust that you can defend against every potential attack. Statistics suggest it’s inevitable that your organisation will suffer a data breach. According to the Scottish Public-Sector Action Plan 2017-18, all public-sector bodies and their key partners will need to take “key actions” to improve their resilience to cyber attacks.

article thumbnail

uTorrent Users Warned of Remote Code Execution Vulnerability

Threatpost

Google Project Zero researchers are warning of two critical remote code vulnerabilities in popular versions of uTorrent's web-based BitTorrent client and its uTorrent Classic desktop client.

IT 56
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Join us for ARMA NYC's Spring Conference March 6th!

Gimmal

On March 6th, records managers and information governance professionals across the Mid-Atlantic and New England will be coming together in New York City for a day filled with education, networking and vendor exhibits. Co-hosted by ARMA Metro NYC, ARMA Long Island, and ARMA Connecticut, Gimmal is proud to sponsor this important industry event.

article thumbnail

7 Cryptominers & Cryptomining Botnets You Can't Ignore

Dark Reading

Cryptominers have emerged as a major threat to organizations worldwide. Here are seven you cannot afford to ignore.

71
article thumbnail

New Spectre/Meltdown Variants

Schneier on Security

Researchers have discovered new variants of Spectre and Meltdown. The software mitigations for Spectre and Meltdown seem to block these variants, although the eventual CPU fixes will have to be expanded to account for these new attacks.

52
article thumbnail

Getting Started with IoT Security in Healthcare

Dark Reading

There's a hazard that comes with introducing any new element into patient care whether it's a new drug or a connected device. These four steps will help keep patients safe.

IoT 53
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Offsite Records Storage Frequently Asked Questions

Record Nations

While the benefits of offsite records storage are being taken advantage of by a growing number of businesses, there is still some obscurity as to how the service works. In order to provide a clear understanding of offsite records storage for new businesses looking to increase their workplace productivity and security, a collection of commonly […].

article thumbnail

When is a data catalog no longer a catalog?

Information Management Resources

The answer impacts how governing and stewarding data and analytics will change the ways an organization increases value and improves its decision-making skills.

article thumbnail

A Closer Look at Some of the New Trends in the Market

Info Source

There is an old adage that “everything old is new again,” and document imaging industry veteran Greg Council thinks he may have already seen some of the new “innovations” sweeping the market these days. This includes AI, RPA, and even crowdsourcing. We recently caught up with Greg, who is the VP of marketing and product management for automated recognition ISV Parascript, and he shared his thoughts on how these innovations have matured and started to have an effect on our industry.

article thumbnail

Predictions for 2018 – This is where the magic happens!

CGI

Predictions for 2018 – This is where the magic happens! ravi.kumarv@cgi.com. Wed, 02/21/2018 - 03:49. I recently shared my thoughts on the Top 5 business changing IT trends from 2017. Now, much like data analytics, I will pivot from reactive to predictive mode and make some forecasts for 2018. There is so much change going on, the one thing that I can predict with the utmost confidence is that digital transformation will continue.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Amended Colorado Bill Aims to Enhance Data Privacy Laws

Data Protection Report

As Data Protection Report posted on January 29, 2018 , lawmakers in Colorado are considering legislation that, if enacted, would significantly strengthen Colorado’s data privacy protections. On Wednesday, February 14, 2018, an amended bill passed unanimously in Colorado’s House Committee on State, Veterans and Military Affairs. The proposed bill overlaps with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and state privacy laws.

article thumbnail

AI in eDiscovery: The Future is Here

Hanzo Learning Center

Let’s just get this out of the way: the robots are not going to take your jobs. Actually, they’ll make it easier for you to do your job by taking tedious work off your hands. The world of eDiscovery is definitely changing, but the changes can work to your benefit. As AI continues to become more prominent in the eDiscovery space, try to think of it as more of an assistant, rather than a replacement.

IT 40
article thumbnail

Takeaways from the Russia-Linked US Senate Phishing Attacks

Dark Reading

The Zero Trust Security approach could empower organizations and protect their customers in ways that go far beyond typical security concerns.

article thumbnail

ArcSight vs IBM QRadar: Top SIEM Solutions Compared

eSecurity Planet

A look at the strengths and weaknesses of ArcSight and IBM QRadar, two leading SIEM solutions.

56
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

C-Suite Divided Over Security Concerns

Dark Reading

Survey shows 60% of CEOs plan to invest the most resources in malware prevention, but CISOs, CIOs, and CTOs are on a different page.

article thumbnail

Intel Issues Updated Spectre Firmware Fixes For Newer Processors

Threatpost

Intel has issued a firmware fix to help its Kaby Lake, Coffee Lake and Skylake processors address the Spectre security flaw.

article thumbnail

Trucking Industry Launches Info Sharing, Cybercrime Reporting Service

Dark Reading

American Trucking Associations developed new Fleet CyWatch threat reporting, information sharing service in conjunction with FBI.

45
article thumbnail

No Sanctions for Failing to Preserve Cell Phone Records and Call Logs: eDiscovery Case Law

eDiscovery Daily

In Dotson, et al. v. Edmonson, et. al., No. 16-15371 (E.D. La. Jan. 22, 2018) , Louisiana District Judge Susie Morgan denied the plaintiff’s motion in limine seeking sanctions for spoliation of evidence, finding that the plaintiff had “not met his burden of establishing that the Trooper Defendants had a duty to preserve” cell phone records and call logs from the evening of October 7, 2015 from Louisiana State Police (LSP) issued cell phones that were used that night by LSP officers during an und

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Mobile Threat: 4 out of 10 Businesses Report 'Significant' Risk

Dark Reading

Organizations put efficiency and profit before security, leading to system downtime and data loss, according to inaugural research from Verizon.

Risk 40
article thumbnail

New BEC Spam Campaign Targets Fortune 500 Businesses

Threatpost

A new business email compromise campaign targets financial transactions tied to Fortune 500 firms.

article thumbnail

Global Cybercrime Costs Top $600 Billion

Dark Reading

More than 50% of attacks result in damages of over $500K, two reports show.

54