Mon.Dec 23, 2019

article thumbnail

The Worst Hacks of the Decade

WIRED Threat Level

It's been a rough 10 years in cybersecurity—and it's only getting worse.

article thumbnail

How decision intelligence can use data to help create a better world

Information Management Resources

In the new book, 'LINK: How Decision Intelligence Connects Data, Actions, and Outcomes for a Better World,' author Lorien Pratt says we need to take AI to the next level to solve critical social problems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2020 & Beyond: The Evolution of Cybersecurity

Dark Reading

As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.

article thumbnail

Maze Ransomware Gang Names More Alleged Victims

Data Breach Today

Criminals Confirm Florida City of Pensacola Hit, Threaten to Dump Stolen Data The gang behind Maze ransomware now lists 21 alleged victims on its website that it says have not paid a demanded ransom, including the Florida city of Pensacola. But Canadian construction firm Bird, which was listed as a victim, subsequently disappeared from the list.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Record Retention is a Key Component of Your Privacy and Cyber Compliance Program

Data Protection Report

This blogpost summarises our recent webinar: “ An urgent message from Berlin: The importance of record retention in privacy and cybersecurity ”. Why should this be a high priority project? Increased regulation and enforcement action. In 2019, we saw regulators put a renewed focus on how long businesses retain personal information. The most significant action came in October, when the Berlin Commissioner for Data Protection and Freedom of Information issued a €14.5million fine against German real

Privacy 144

More Trending

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

In the late 1950s, the United States invited its top test pilots to apply to become the nation’s first astronauts. As memorialized in the book The Right Stuff , test pilots then had to decide whether to transition into an uncertain-yet-vaguely-familiar new career or continue along their present path. Some made the move and became famous; others didn’t, and many of them faded into history.

article thumbnail

MyKings Cryptomining Botnet Leverages EternalBlue Flaw

Data Breach Today

Researchers Also Find Malicious Code Hiding in Taylor Swift Image The MyKings botnet, which has been spreading cryptominers and other malware, continues to grow in sophistication, using steganography to hide malicious updates, Sophos Labs reports. New research also shows attackers are exploiting the EternalBlue vulnerability in Windows.

162
162
article thumbnail

CVE-2019-19781 Citrix flaw exposes 80,000 companies at risk

Security Affairs

Critical CVE-2019-19781 flaw in Citrix NetScaler ADC and Citrix NetScaler Gateway could be exploited to access company networks, 80,000 companies at risk worldwide. A critical vulnerability in Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway), tracked as CVE-2019-19781 , could be exploited by attackers to access company networks.

Risk 98
article thumbnail

Building Cyber Resilience at a Foundational Level

Data Breach Today

Ron Ross of NIST on Developing New Safeguards Future trustworthy and secure cyber systems need to be able to operate even in a degraded state. Ron Ross of NIST details the components of a new publication on cyber resiliency.

Security 147
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tighter Security for Virtru through Central Management

Jamf

Read how Virtru ventured into the governmental space and was able to leverage Jamf Now’s central management to gain FedRAMP compliance.

article thumbnail

MasterCard Inks Deal for Startup RiskRecon

Data Breach Today

Acquisition Adds Third-Party Risk Assessment Capabilities MasterCard will acquire security startup RiskRecon for an undisclosed sum, the two companies announced Monday. The deal will allow MasterCard to offer third-party risk assessment to its business customers and consumers.

Risk 147
article thumbnail

Op Wocao – China-linked APT20 was able to bypass 2FA

Security Affairs

China-linked cyber espionage group APT20 has been bypassing two-factor authentication (2FA) in recent attacks, cyber-security firm Fox-IT warns. Security experts from cyber-security firm Fox-IT warns of a new wave of attacks, tracked as Operation Wocao, carried out by China-linked cyber espionage group APT20 that has been bypassing 2FA. The attacks aimed at government entities and managed service providers (MSPs) that were active in many industries, including aviation, healthcare, finance, insur

article thumbnail

Cybersecurity Leadership: The 2020 Vision

Data Breach Today

Cyber Leader Christopher Hetner on the Capacities, Skills Needed for Next Decade's Security Leaders What are the key experiences, capacities and skills needed by the next generation of cybersecurity leaders, as they prepare to address enterprise business risk in the next decade? Ex-CISO and current advisor Christopher Hetner shares his vision of the future of cyber leadership.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Top 10 IoT Disasters of 2019

Threatpost

From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.

IoT 72
article thumbnail

Three Members of GozNym Malware Gang Sentenced

Data Breach Today

Cybercriminals Tied to Theft of Over $100 Million Worldwide Three member of a cybercriminal gang that used the GozNym malware platform to steal approximately $100 million from victims across the world have been sentenced for their roles in the scam, according to U.S. Justice Department and prosecutors in the country of Georgia.

147
147
article thumbnail

Lithuanian man sentenced to 5 years in prison for stealing $120 Million From Google, Facebook

Security Affairs

Lithuanian man Evaldas Rimasauskas was sentenced to five years in jail for stealing $120 Million from Google and Facebook employees. Evaldas Rimasauskas was sentenced to five years of prison for stealing $120 Million from Google and Facebook employees with business email compromise (BEC) attacks carried out between 2013 and 2015. The Lithuanian citizen Evaldas Rimasauskas (48) was arrested in March 2017 by local authorities.

article thumbnail

The Promise and Reality of AI and ML in Security Management

Data Breach Today

Dena Bauckman of ZixCorp Helps Separate Signal from Noise AI and ML are often described inaccurately for their role in threat mitigation. Dena Bauckman of ZixCorp explains where the technologies are currently being used most effectively.

Security 147
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SIM Swapping Attacks: What They Are & How to Stop Them

Dark Reading

Fraudsters with social engineering skills are hijacking cell phone SIM cards to access victims' bitcoin and social media accounts

Access 81
article thumbnail

Ransomware 2.0: Cybercrime Gangs Apply APT-Style Tactics

Data Breach Today

While run-of-the-mill ransomware attacks continue, some crypto-locking malware gangs are bringing more advanced hacking skills to bear against targets, seeking the maximum possible payout, says cybersecurity expert Jake Williams of Rendition Infosec, who dubs the trend "ransomware 2.0.

article thumbnail

RavnAir Alaska airline canceled some flights following a cyber attack

Security Affairs

RavnAir airline was forced to cancel at least a half-dozen flights in Alaska on Saturday following a “malicious cyber attack”. The RavnAir airline was forced to cancel at least a half-dozen flights in Alaska on Saturday following a cyber attack, around 260 passengers were not able to fly. According to the company, the attack hit its maintenance system and its back-up, for this reason the airline was forced to interrupt its operations. “The cancellations affected around 260 passengers

Access 59
article thumbnail

Santa and the Zero-Trust Model: A Christmas Story

Dark Reading

How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Twitter Fixes Bug that Enabled Takeover of Android App Accounts

Threatpost

Twitter for Android users are urged to update their app to fend off a security bug that allows hackers to access private account data and control accounts to send tweets and direct messages.

Access 55
article thumbnail

Recap: Collibra Family Day 2019

Collibra

We are one Collibra. We work, learn and have fun together. On Family Day we emulated this core value by inviting all Collibrians to bring their families to work. We pride ourselves on cultivating an authentic and healthy culture. We want our employees to be themselves and we appreciate each employee for who they are. Family Day provided the perfect environment for Collibrians to truly bring their full selves to work, while also giving our employees an opportunity to introduce their loved ones an

article thumbnail

Record Retention is a Key Component of Your Privacy and Cyber Compliance Program

Data Protection Report

This blogpost summarises our recent webinar: “ An urgent message from Berlin: The importance of record retention in privacy and cybersecurity ”. Why should this be a high priority project? Increased regulation and enforcement action. In 2019, we saw regulators put a renewed focus on how long businesses retain personal information. The most significant action came in October, when the Berlin Commissioner for Data Protection and Freedom of Information issued a €14.5million fine against German real

Privacy 52
article thumbnail

EUROPE: “Schrems 2.0” 5 takeaways from the Advocate General’s Opinion

DLA Piper Privacy Matters

By Patrick Van Eecke, Andrew Dyson & Anne-Gabrielle Haie. On 19 December, the Advocate General issued his opinion in the Schrems 2.0 case concerning the validity of two key data transfer mechanisms: Standard Contractual Clauses (SCCs) and Privacy Shield – mechanisms widely used by businesses within the European Economic Area (EEA) to legitimise the transfer of personal data to countries outside the EEA.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Department of Education and Department of Health and Human Services Release First Update to Joint Guidance on FERPA and HIPAA Since 2008

Hunton Privacy

The U.S. Department of Education and the U.S. Department of Health and Human Services released joint guidance on the application of the Family Educational Rights and Privacy Act (“FERPA”) and the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy Rule to student records. This is the first update to the agencies’ guidance since it was issued in 2008.

article thumbnail

Data privacy challenges will increase in 2020 with actual enforcement

Information Management Resources

Our digital identity is strewn across devices, software, and applications and if we don’t know what exists or how it can be found, we are leaving a wealth of information unprotected.

article thumbnail

Former NY Hospital Employee Admits to Stealing Colleagues' Data

Dark Reading

Richard Liriano pleads guilty to compromising hospital computers and co-workers' email accounts, as well as stealing personal files and photos.

48