Wed.Jun 27, 2018

article thumbnail

Former NSA Contractor Pleads Guilty to 'Top Secret' Leak

Data Breach Today

Plea Deal Calls For Reality Winner to Serve 63-Month Sentence Reality Leigh Winner, 26, a former contractor for the NSA, has pleaded guilty to leaking a "top secret" five page document that describes Russian meddling with U.S. voting systems. She's agreed to a plea deal that calls for her to serve a 63-months prison sentence.

94
article thumbnail

Marketing Firm Exactis Leaked a Personal Info Database With 340 Million Records

WIRED Threat Level

The leak may include data on hundreds of millions of Americans, with hundreds of details for each, from demographics to personal interests.

Marketing 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Infographic: List of data breaches in 2017

IT Governance

2017 was a big year for data breaches. Uber , Equifax and Yahoo all fell victim, and many small organisations also suffered a breach or cyber attack. When it comes to cyber threats, all types of organisations are at risk. Using the findings of our monthly ‘list of data breaches and cyber attacks’ blog posts, we’ve created an infographic that summarises reported data breaches from 2017.

article thumbnail

The Digital Privacy Wins Keep Coming

WIRED Threat Level

From *Carpenter v. United States* to a landmark bill in California, privacy advocates sense a shift in what people will accept from Facebook, mobile carriers, and more.

Privacy 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IEEE Statement on Strong Encryption vs. Backdoors

Schneier on Security

The IEEE came out in favor of strong encryption: IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications. We oppose efforts by governments to restrict the use of strong encryption and/or to mandate exceptional access mechanisms such as "backdoors" or "key escrow schemes" in order to facilitate government access to encrypted data.

More Trending

article thumbnail

Jamf Now or Jamf Pro: Which is right for you?

Jamf

See the Apple management differences of Jamf Now and Jamf Pro, and discover which solution is best suited to help you address your unique goals and requirements.

69
article thumbnail

HTTPS Is Easy!

Troy Hunt

HTTPS is easy! In fact, it's so easy I decided to create 4 short videos around 5 minutes each to show people how to enable HTTPS on their site and get all traffic redirecting securely, optimise their HTTPS configuration to get it rating higher than most banks, fix any insecure references in a few clicks and finally, secure all the traffic all the way back to their website.

article thumbnail

Anthony Kennedy’s Retirement May Have Huge Consequences for Privacy

WIRED Threat Level

Kennedy’s record is mixed, but he was a thoughtful voice on how to interpret constitutional rights for the internet era.

Privacy 75
article thumbnail

AI helps you hear your customers’ voice

OpenText Information Management

Your customers are talking to you, and about you, but are you gaining any value from those conversations? Success in business requires a relentless focus on customers. And learning from their own words provides you with the insight to better engage with them through the personal experience they expect. So how do you measure and … The post AI helps you hear your customers’ voice appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cynicism in Cybersecurity: Confessions of a Recovering Cynic

Dark Reading

Anyone constantly dealing with complex computer systems teetering on the brink of disaster will likely succumb to the cult of cynicism. These four strategies will help you focus on the positive.

article thumbnail

Ranking Information By Personal Relevancy

Attensa

About a year ago we did a post entitled Relevancy – the killer app. The ability to personalize is essential to getting the modern digital work experience right. This has been true for years and is becoming more important as the amount of information and number of workplace silos grow. Attensa’s platform addresses the need to manage the ever-increasing number of interactions between people and workplace content.

IT 49
article thumbnail

10 Tips for More Secure Mobile Devices

Dark Reading

Mobile devices can be more secure than traditional desktop machines - but only if the proper policies and practices are in place and in use.

article thumbnail

Give the people what they want: Better financial product recommendations

OpenText Information Management

One of the big advantages of doing business in a digital world is being able to make use of the data exhaust left by practically every action and interaction—from what a person buys on Amazon to what newspapers or magazines they read, who they’re Facebook-chatting with and what time they drove across the Golden Gate … The post Give the people what they want: Better financial product recommendations appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Russia, Facebook & Cybersecurity: Combating Weaponized FUD in the Social Media Age

Dark Reading

It's up to everyone -- users, security pros, government -- to be critical about the online information we encounter.

article thumbnail

Millions of Smartphones Hosting Hacker Bots

Adam Levin

Hackers may be in your phone right now (or your tablet). Think it’s not possible because your connected device is performing well? Think again. These hacks are discreet, using your device’s computing power to commit crimes. In a study commissioned by Distil Networks entitled “ Mobile Bots: The Next Evolution of Bad Bots ” it was determined that as many as 5.8 percent of all mobile devices worldwide have been infected with bots, a kind of malware that parasitically uses the computing power of its

article thumbnail

Hundreds of Hotels Hit in FastBooking Breach

Dark Reading

The hotel booking software provider reports an actor stole personal and payment card data of guests from hundreds of properties.

52
article thumbnail

Innovators under 35

ForAllSecure

I am truly honored to share that I have been named to MIT Technology Review’s prestigious annual list of Innovators Under 35 as a Pioneer. The award, first given by the magazine in 1999, celebrates young innovators who are poised to be leaders in their fields. Many amazing people have been given this award: Larry Page and Sergey Brin of Google; Mark Zuckerberg of Facebook; Max Levchin of PayPal.

40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Today! 'Why Cybercriminals Attack,' A Dark Reading Virtual Event

Dark Reading

Wednesday, June 27, this all-day event starting at 11 a.m. ET, will help you decide who and what you really need to defend against, and how to do it more effectively.

IT 44
article thumbnail

Innovative Solutions to Real Business Problems with Big Data from Space

CGI

Innovative Solutions to Real Business Problems with Big Data from Space. p.butler@cgi.com. Wed, 06/27/2018 - 10:00. 10 Petabytes of free Earth observation (EO) data is generated by the Copernicus Programme every year. Copernicus is Europe’s most ambitious EO programme and provides full free and open access to data for the development of applications in a wide variety of domains.

article thumbnail

Three things you’ll learn about eDiscovery at OpenText Enterprise World

OpenText Information Management

Last year’s Enterprise World was so much fun we decided to do it again. The OpenText™ Discovery team is returning to Toronto in July for a week of engaging sessions, interactive demos and networking events. This is a once-in-a-year opportunity to learn from and engage with the world’s top legal talent. OpenText Discovery clients have … The post Three things you’ll learn about eDiscovery at OpenText Enterprise World appeared first on OpenText Blogs.

IT 40
article thumbnail

US Supreme Court expands digital privacy rights in Carpenter v. United States

Data Protection Report

On June 22, 2018, the US Supreme Court issued a 5-4 decision in Carpenter v. United States, holding that the federal government needs a warrant to access cellphone location records. In the decision, the Court agreed that there should be a higher standard for accessing location records due to their intrusive nature. At issue in Carpenter was the government’s warrantless collection of historical cellphone location records.

Privacy 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

KeyMark Named 2018 Best Places to Work in South Carolina for Third Straight Year

Info Source

For the third year in a row, KeyMark was named as one of the Best Places to Work in South Carolina. This thirteenth annual program was created by SC Biz News in partnership with the South Carolina Chamber of Commerce and Best Companies Group. Liberty, SC, United States., June 22, 2018 – (PressReleasePoint) – For the third year in a row, KeyMark was named as one of the Best Places to Work in South Carolina.

article thumbnail

Asia Pacific Data Protection and Cybersecurity Regulation: 2017 in Review and Looking Ahead to 2018

HL Chronicle of Data Protection

2017 was a momentous year for data protection and cyber security regulation globally, and it is noteworthy how significant the developments in the Asia-Pacific (APAC) region were over the course of the year. Much of the focus internationally was on preparations for the May, 2018 implementation of the European Union’s General Data Protection Regulation (GDPR).

article thumbnail

National Archives updates progress on ICE records disposition

Archives Blogs

The proposed Immigration and Customs Enforcement (ICE) records schedule for records related to detainees held in ICE detention facilities (DAA-0567-2015-0013) has received significant attention in the media and by concerned individuals. Because of the ongoing interest in this schedule, NARA is providing this update on the status of the review. The draft schedule includes files documenting cases of sexual abuse and assault of detainees, as well as detainee death investigation files.

article thumbnail

Coin Miner Malware Spikes 629% in 'Telling' Q1

Dark Reading

Drastic growth suggests adversaries are learning how they can maximize rewards with minimal effort.

54
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

WebAssembly Changes Could Ruin Meltdown and Spectre Browser Patches

Threatpost

The planned threading in shared memory update gives bad actors a way around the timer mitigations released by browser vendors.

article thumbnail

IEEE Calls for Strong Encryption

Dark Reading

Newly issued position statement by the organization declares backdoor and key-escrow schemes could have 'negative consequences.

article thumbnail

Smart city advances leave data, systems more vulnerable

Information Management Resources

The energy sector is the critical infrastructure system most susceptible to cyber attacks, followed by communications and financial services.