Mon.May 07, 2018

article thumbnail

3 ways that data visualization can reshape the enterprise

Information Management Resources

If harnessed correctly, this technology has the power to improve an organization's productivity, client relationships and profitability all at once.

article thumbnail

Cloud service providers and the NIS Directive – are you resilient enough?

IT Governance

The EU Directive on security of network and information systems is required to be transposed into UK law by 9 May 2018. The domestic law, in force from 10 May 2018, will be known as the ‘NIS Regulations’. What is the objective of the NIS Regulations? The NIS Regulations aim to reduce the risk of disruption to critical services by requiring relevant organisations to protect their networks and information systems.

Cloud 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How artificial intelligence may replace today's IT service desk

Information Management Resources

It might not happen soon, but it’s not difficult to imagine end users resetting a malfunctioning router or getting software installed through virtual assistants like Siri and Alexa.

article thumbnail

Report: Chinese Actors Steal Code-Signing Certificates

Data Breach Today

ProtectWise Says Group's Mistakes Proved Helpful During Investigation Security vendor ProtectWise says a series of operating mistakes has allowed it to gain insight into a group, believed to be affiliated with Chinese intelligence, that specializes in stealing code-signing certificates. The certificates allow for the signing of malware that's unlikely to raise security alarms.

Security 165
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Find the rotten insights dragging down your business

IBM Big Data Hub

Each insight is useful for only a limited amount of time, so organizations that don’t closely track their insights’ shelf lives may be making poor decisions because of outdated information. Learn how to fix this.

78

More Trending

article thumbnail

Ray Ozzie's Encryption Backdoor

Schneier on Security

Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints Ozzie's proposal as something that "attains the impossible" and "satisfies both law enforcement and privacy purists," when (1) it's barely a proposal, and (2) it's essentially the same key escrow scheme we've been hearing about for decades.

article thumbnail

InstaSafe: A Software-Defined Perimeter

Data Breach Today

CEO Sandip Kumar Panda on Secure Connectivity Sandip Kumar Panda, co-founder and CEO of InstaSafe, which offers a software-defined perimeter solution, talks about his company's approach toward secure connectivity.

Security 100
article thumbnail

Why DDoS Just Won't Die

Dark Reading

Distributed denial-of-service attacks are getting bigger, badder, and 'blended.' What you can (and can't) do about that.

62
article thumbnail

Tessian: Using Machine Learning to Prevent Data Loss

Data Breach Today

Abhirukt Sapur on Monitoring Behavioral Patterns Abhirukt Sapru, head of business development at Tessian, describes the use of machine learning to help prevent highly sensitive information from being sent to the wrong person via email.

100
100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Decreasing Usefulness of Positive Visual Security Indicators (and the Importance of Negative Ones)

Troy Hunt

Remember when web security was all about looking for padlocks? I mean in terms of the advice we gave your everyday people, that's what it boiled down to - "look for the padlock before entering passwords or credit card info into a website" Back in the day, this was pretty solid advice too as it gave you confidence not just in the usual confidentiality, integrity and authenticity of the web traffic, but in the legitimacy of the site as well.

article thumbnail

Lenovo Patches Arbitrary Code Execution Flaw

Threatpost

Lenovo warns of a high-severity bug impacting its System x line of servers, along with a medium-severity buffer-overflow vulnerability affecting its popular ThinkPad line.

IT 46
article thumbnail

SynAck Ransomware Gets Dangerous 'Doppleganging' Feature

Dark Reading

New Process Doppelganging, obfuscation features makes the malware much harder to spot and stop.

article thumbnail

The Life Sciences MLR process

OpenText Information Management

Medical Legal Review (MLR) has always been one of the most challenging and complex aspects of the marketing production process for Life Sciences companies. In an increasingly global and digital world, these challenges are intensifying. Organizations need a fresh approach to MLR that enables a timely and efficient marketing workflow and allows for rapid process … The post The Life Sciences MLR process appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Defending Against an Automated Attack Chain: Are You Ready?

Dark Reading

Recent threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

56
article thumbnail

Variant of SynAck Malware Adopts Doppelgänging Technique

Threatpost

Ransomware adopts Process Doppelgänging technique to avoid antivirus researchers and avoid detection in a newly identified malware double threat targeting users in the U.S., Kuwait and Germany.

article thumbnail

What Is SQL Injection and How Can It Hurt You?

eSecurity Planet

Using SQL injection, hackers can wreak havoc on databases and data-driven applications. Fortunately, there are ways to reduce SQL injection risk.

IT 46
article thumbnail

10 Lessons From an IoT Demo Lab

Dark Reading

The Demo Lab at InteropITX 2018 was all about IoT and the traffic - legitimate and malicious - it adds to an enterprise network.

IoT 51
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Asylo Open-Source Framework Tackles TEEs for Cloud

Threatpost

The idea is to use trusted execution environments to build trust across various cloud-related use cases, including 5G, virtual network functions (VNFs), blockchain and more.

Cloud 41
article thumbnail

Google Security Updates Target DevOps, Containers

Dark Reading

The tech giant explains why it's rolling out a new cloud security management tool and an open-source framework for confidential computing.

article thumbnail

With a focus on delivering real customer value, OpenText Documentum 16.4 delivers

OpenText Information Management

Over the past year, I’ve had many conversations with Documentum™ customers. Some were long-time customers, some are much more recent, but as we’ve discussed previously in this space, nearly all of them are watching closely to measure the OpenText™ commitment to Documentum’s future and most were carefully watching for the first Documentum update. Today, we … The post With a focus on delivering real customer value, OpenText Documentum 16.4 delivers appeared first on OpenText Blogs.

40
article thumbnail

Fiserv and Rippleshot Announce Card Fraud Detection Partnership

Rippleshot

Fiserv, a global provider of financial services technology solutions, announced its partnership with Rippleshot to offer Card Risk Office? Fraud Warning, an early breach detection solution that allows financial institutions to identify potential fraud events 30-60 days prior to network alerts. "Card fraud is a complex and ever-changing problem that demands a collaborative and proactive approach to tackle it effectively, so that cardholders can feel secure about the financial information they are

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mobile Phone Maker BLU Settles FTC Privacy and Data Security Claims

Hunton Privacy

On April 30, 2018, the Federal Trade Commission announced that BLU Products, Inc. (“BLU”), a mobile phone manufacturer, agreed to settle charges that the company allowed ADUPS Technology Co. Ltd. (“ADUPS”), a third-party service provider based in China to collect consumers’ personal information without their knowledge or consent, notwithstanding the company’s promises that it would keep the relevant information secure and private.

Privacy 40
article thumbnail

OpenText launches Content Suite 16 EP4

OpenText Information Management

OpenText Content Suite 16 EP4 simplifies user interaction with content In today’s connected world, users demand access to their content from anywhere, anytime, and virtually from any interface. The following product enhancements enable users to focus on tasks and productivity rather than technologies and tools. This week, OpenText™ released Enhancement Pack 4 (EP4) for OpenText … The post OpenText launches Content Suite 16 EP4 appeared first on OpenText Blogs.

Access 40
article thumbnail

Romanian Hackers Extradited to U.S. over $18M Vishing Scam

Threatpost

The two have been arraigned in a Georgia district court on charges relating to an elaborate voice- and SMS-phishing (i.e., vishing/smishing) scheme.

article thumbnail

Trial Begins for Latvian Man Accused of Malware Operation

Dark Reading

Ruslans Bondars has been accused of running a malware service that had been linked to cyberattacks on US businesses.

42
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cryptojacking Campaign Exploits Drupal Bug, Over 400 Websites Attacked

Threatpost

Hundreds of sites vulnerable to 'Drupalgeddon 2.0' have been impacted by a massive cryptomining campaign.

44
article thumbnail

Former Autonomy CFO Convicted of Fraud: eDiscovery Trends

eDiscovery Daily

Remember the fiasco that was the Hewlett-Packard (HP) acquisition of Autonomy (and our coverage of it back then)? Back in 2012, HP took a multi billion charge resulting from its acquisition of Autonomy back in 2011, one of the largest acquisitions in the eDiscovery industry at the time (and still). HP called on US and British authorities to investigate what it called “serious accounting improprieties, disclosure failures and outright misrepresentations at Autonomy” before the acquisition.

Sales 39
article thumbnail

US Extradites Romanian Hackers Charged with Vishing, Smishing

Dark Reading

Suspects fraudulently obtained more than $18 million through fraud by voice and SMS.

45