Fri.Jun 28, 2019

article thumbnail

Ex-Equifax CIO Gets 4-Month Prison Term for Insider Trading

Data Breach Today

Prosecutors Say Jun Ying Sold Stock Before Data Breach Was Made Public A former Equifax CIO who sold his stock in the company after learning about its 2017 data breach several months before the public and government agencies were informed has been sentenced to four months in prison for insider trading. Another former Equifax executive was sentenced on similar charges last year.

article thumbnail

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Krebs on Security

It might be difficult to fathom how this isn’t already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Office365 accounts to use multi-factor authentication. The move comes amid a noticeable uptick in phishing and malware attacks targeting CSP employees and contractors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: Huawei's Firmware Riddled With Problems

Data Breach Today

Huawei Has a 'Weak Security Posture,' Cybersecurity Firm Contends The firmware of more than 500 Huawei networking products is riddled with security weaknesses that make the vendor risky to use for 5G networks, a new report contends. The study analyzed more than 9,000 firmware images in 558 enterprise products from the Chinese company.

article thumbnail

I'm Leaving IBM

Schneier on Security

Today is my last day at IBM. If you've been following along, IBM bought my startup Resilient Systems in Spring 2016. Since then, I have been with IBM, holding the nicely ambiguous title of "Special Advisor." As of the end of the month, I will be back on my own. I will continue to write and speak, and do the occasional consulting job. I will continue to teach at the Harvard Kennedy School.

Access 105
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cloudflare Calls Internet Outage 'Small Heart Attack'

Data Breach Today

The latest edition of the ISMG Security Report discusses Cloudflare's harsh criticism of Verizon over an internet outage it labeled as a "small heart attack." Plus: sizing up the impact of GDPR; reviewing highlights of the ISMG Healthcare Security Summit.

GDPR 160

More Trending

article thumbnail

Third-Party Risk Management: Asking the Right Questions

Data Breach Today

An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strategy officer and senior vice president at the Santa Fe Group, a strategic advisory company, who spells out key issues to address.

Risk 145
article thumbnail

How to Dominate the Domains of the NEW CIP - D5: Implementing an Information Management Solution

AIIM

Welcome back to the last post in this series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 5, Implementing an Information Management Solution. You can review the previous posts in this series here: Domain 1: Creating and Capturing Information. Domain 2: Extracting Intelligence from Information.

article thumbnail

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process.

Security 142
article thumbnail

Talos discovered Spelevo EK, an exploit kit spreading via B2B Website

Security Affairs

Researchers at Cisco Talos group have discovered a new exploit kit dubbed Spelevo that spreads via a compromised business-to-business website. Malware researchers at Cisco Talos have discovered a new exploit kit dubbed Spelevo that spreads via a compromised business-to-business website. The popularity of EK rapidly decreased with the demise of the Angler Exploit Kit , but the discovery of the Spelevo exploit kit demonstrates that crooks continue to leverage on EKs to deliver malware.

B2B 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mastercard on the Evolution of Authentication

Data Breach Today

Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate users. Diego Szteinhendler of Mastercard outlines new strategies and tools for evolving authentication practices beyond solely payments security.

article thumbnail

Cellebrite Claims It Can Unlock Any iPhone

Schneier on Security

The digital forensics company Cellebrite now claims it can unlock any iPhone. I dithered before blogging this, not wanting to give the company more publicity. But I decided that everyone who wants to know already knows, and that Apple already knows. It's all of us that need to know.

IT 86
article thumbnail

Regin spyware involved in attack against the Russian tech giant Yandex

Security Affairs

Allegedly Western nation-state actors breached the systems of Russian tech giant Yandex in 2018, the attack involved a new variant of the Regin malware. According to the Reuters, Western state-sponsored hackers breached the systems of the Russian tech giant Yandex in 2018, the attack involved a new variant of the Regin malware. The Regin malware has been around since at least 2008, most Regin infections were observed in Russia (28%) and Saudi Arabia (24%), but other attacks were spotted in Ira

article thumbnail

Time savings you can expect with Jamf

Jamf

To ensure you’re getting the most out of your Apple device management tool — or to ensure you’re using the right management tool — let’s take a close look at the time savings you get with Jamf Pro.

75
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights

Dark Reading

This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.

article thumbnail

The Infrastructure Mess Causing Countless Internet Outages

WIRED Threat Level

You may not have heard of the Border Gateway Protocol, but you definitely know when it goes wrong.

IT 98
article thumbnail

How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy

Dark Reading

Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.

Privacy 89
article thumbnail

Voice of the client: The secret to gaining customer loyalty at Localiza

IBM Big Data Hub

Many companies struggle with outdated, duplicate or incorrect customer data. At Localiza, we can go beyond identifying the customer by name, profession and role -- to customizing the entire experience based on the customer’s past history with us. With this 360-degree view of each customer’s current activity and rental or purchase history, we can deliver more responsive and personalized service.

70
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MongoDB Leak Exposed Millions of Medical Insurance Records

Threatpost

Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.

article thumbnail

Cloud Provider PCM Suffers Data Breach

Dark Reading

Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.

article thumbnail

One Year of CCPA

Hunton Privacy

Today marks one year since the California Consumer Privacy Act of 2018 (“CCPA”) was passed and signed into law. The CCPA signals a dramatic shift in the data privacy regime in the United States, imposing on covered businesses the most prescriptive general privacy rules in the nation. In addition, the past year has seen a legislative explosion in the form of similar proposed state laws and potential federal data privacy legislation.

article thumbnail

MageCart Launches Customizable Campaign

Dark Reading

A tool new to MageCart bolsters the group's ability to evade detection and steal data.

92
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Dridex Variant Slips By Anti-Virus Detection

Threatpost

A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics.

article thumbnail

Key Biscayne Hit by Cybersecurity Attack

Dark Reading

Key Biscayne is the third Florida town to be hit by hackers in June.

article thumbnail

FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps

Threatpost

The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.

IoT 67
article thumbnail

Ford, TD Bank files found online in cloud data exposure

Information Management Resources

The incident revealed passwords and network information about data management company Attunity as well as emails and technology designs from some of its high-profile customers.

Cloud 53
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Death of the VPN: Enterprise Security Needs New Foundations

Threatpost

Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.

article thumbnail

The intersection evidence, eminence and eloquence based healthcare leadership

DXC Technology

I’m a complete sucker for a great sales pitch. Part of that is because I spent most of my life pitching. Another part is that I spend dozens of hours a month speaking in front of groups of skeptical business leaders and graduate students. I know how a strong presentation style can occasionally overcome less […].

Sales 45
article thumbnail

Determining data value by measuring return on effort

Information Management Resources

Context represents a score that signifies the level and scope of classification and knowledge management applied, and together with semantics provides a level of knowledge about the data value.

48