Tue.Jan 14, 2020

article thumbnail

Windows 7: Microsoft Ceases Free Security Updates

Data Breach Today

Security Experts Recommend Holdouts Review Their IT Strategy and Cloud Options Microsoft has ceased offering free security updates for its Windows 7 operating system, as well as Windows Server 2008 and 2008 R2. But with one-third of all PCs continuing to run Windows 7, experts are urging organizations to immediately move to a more modern operating system.

Security 240
article thumbnail

Patch Tuesday, January 2020 Edition

Krebs on Security

Microsoft today released updates to plug 50 security holes in various flavors of Windows and related software. The patch batch includes a fix for a flaw in Windows 10 and server equivalents of this operating system that prompted an unprecedented public warning from the U.S. National Security Agency. This month also marks the end of mainstream support for Windows 7 , a still broadly-used operating system that will no longer be supplied with security updates.

Security 207
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Baby's First Data Breach: App Exposes Baby Photos, Videos

Data Breach Today

Peekaboo Moments Hasn't Responded to Warning That It's Exposing Personal Content A baby photo and video-sharing app called Peekaboo Moments is exposing sensitive logs through an exposed Elasticsearch database, a researcher has found. The data includes baby photos and videos, birthdates, location data and device information.

article thumbnail

Speaking of: The Paper Clip’s Digital Equivalent

Weissman's World

In the physical world, paper clips are an important source of context, as their use suggests that the pieces of paper they clip together are somehow related. But what is their digital equivalent? And what does this mean in terms of identifying how many documents those pieces of paper represent, the relative importance of the […]. The post Speaking of: The Paper Clip’s Digital Equivalent appeared first on Holly Group.

Paper 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NSA Uncovers 'Severe' Microsoft Windows Vulnerability

Data Breach Today

Microsoft Provides Patch for Cryptographic Flaw in Windows 10 The NSA took the unusual step Tuesday of announcing what it calls a "severe" vulnerability in Microsoft's Windows 10 operating systems ahead of Microsoft's Patch Tuesday security update. The flaw could allow attackers to execute man-in-the-middle attacks or decrypt confidential data within applications.

Security 236

More Trending

article thumbnail

Attorney General Presses Apple to Unlock Shooter's iPhones

Data Breach Today

William Barr Labels Pensacola Attack as an Act of Terrorism U.S. Attorney General William Barr is ratcheting up the pressure on Apple to unlock two iPhones belonging to a Saudi national who carried out a deadly shooting in December. The attorney general is labeling the shooting as an act of terrorism and says Apple is hampering a counterterrorism investigation.

162
162
article thumbnail

5G Security

Schneier on Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Because the companies that make the equipment are subservient to the Chinese government, they could be forced to include backdoors in the hardware or software to give Beijing remote access. Eavesdropping is also a risk, although efforts to listen in would almost certainly be detectable.

Security 136
article thumbnail

Critical Steps in Managing Vendor Security Risk

Data Breach Today

In light of recent ransomware and other cyberattacks against vendors serving numerous healthcare organizations, it's critical to develop and deploy comprehensive vendor risk management programs, says John Farley of Arthur J. Gallagher & Co., a provider of cyber insurance.

Risk 113
article thumbnail

If Russia Hacked Burisma, Brace for the Leaks to Follow

WIRED Threat Level

The Kremlin likely hacked the oil giant. Its next play: selectively release—and even forge—documents. Did the US learn enough from 2016 to ignore them?

IT 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

Today’s innovations and technologies provide tremendous opportunities for enterprises. Along with innovation and technology proliferation, new challenges that will shape business during 2020. The importance of data and the power of being an insights-driven enterprise are increasing the amount of damage that data breaches can cause. The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) that’s often built with only a few security controls and therefo

article thumbnail

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

WIRED Threat Level

In a shift toward transparency, the National Security Agency announced a bug that could have left over 900 million PCs vulnerable to attack.

article thumbnail

Tomorrow’s Jobs Today to be released by John Hunt Publishing in 2020

Information Governance Perspectives

Design your career for tomorrow with wisdom from leaders whose shoulders you stand on today. It gives me great pleasure to shout from the digital mountaintop that along with my co-author, Abby Moscatel, Esq., we’ve signed a book deal with John Hunt Publishing to release our book, Tomorrow’s Jobs Today: Wisdom and Career Advice from Continue reading.

IT 92
article thumbnail

Four New Year’s resolutions for Documentum customers

OpenText Information Management

It’s the beginning of a new year — and a new decade — and, for many, it’s time for the annual tradition of setting new year’s resolutions. Today, let’s spend a few moments talking about a professional objective that’s on the minds of many OpenText™ Documentum ™ customers — your organization’s information management strategy and, … The post Four New Year’s resolutions for Documentum customers appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Patches Windows Vuln Discovered by the NSA

Dark Reading

The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is a new approach to security.

article thumbnail

The Mandalorian Is the Only Smart Soldier in the Star Wars Galaxy

WIRED Threat Level

It took decades, but the galaxy finally has a tactical and operational genius. .

IT 99
article thumbnail

Cisco addressed a high-severity bug in Webex that could allow Remote Code Execution

Security Affairs

Tech giant Cisco has recently addressed two high-severity vulnerabilities affecting its Webex and IOS XE Software products. Cisco Systems has released security fixes for two high-severity vulnerabilities in its products, including a remote code execution flaw in the Webex video conferencing platform. The Webex flaw resides in the web-based management interface of Cisco Webex Video Mesh, a feature that enables on-premises infrastructure for video conferencing. “A vulnerability in the web-ba

article thumbnail

Travelex says it won’t pay ransom to crooks as currency chaos continues

IT Governance

While most of us spent New Year’s Eve celebrating, the IT department at Travelex was grappling with a ransomware virus that was spreading through its systems. Almost two weeks on, the currency exchange service is finally starting to restore its internal systems , having been forced to take its website offline and suspend many of its operations. Employees have been forced to work with pen and paper, severely delaying the few processes that could still be performed, while several UK banks that wor

IT 64
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Keep Security on Life Support After Software End-of-Life

Dark Reading

It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?

article thumbnail

January 2020 Adobe Patch Tuesday updates fix issues in Illustrator, Experience Manager

Security Affairs

Adobe released its January 2020 Patch Tuesday updates that address several flaws in Illustrator and Experience Manager products. Adobe releases its first 2020 patch Tuesday software updates that address several vulnerabilities in Illustrator and Experience Manager products. “Adobe has published security bulletins for Adobe Experience Manager ( APSB20-01 ) and Adobe Illustrator ( APSB20-03 ).

article thumbnail

Consumer Reports Calls for IoT Manufacturers to Raise Security Standards

Dark Reading

A letter to 25 companies says Consumer Reports will change ratings to reflect stronger security and privacy standards.

article thumbnail

Welcoming Lesley Stahl as the 2020 Hero Awards Guest Speaker

Zapproved

The fourth annual Corporate Ediscovery Hero Awards, which celebrates innovators and achievers in ediscovery practice, will host renowned journalist and author Lesley Stahl as featured guest. The post Welcoming Lesley Stahl as the 2020 Hero Awards Guest Speaker appeared first on Zapproved.

52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Solving data challenges to accelerate the energy transition

CGI

Solving data challenges to accelerate the energy transition. ravi.kumarv@cgi.com. Tue, 01/14/2020 - 02:21. The energy transition is a technological, cultural and organizational sea change—and data is the means by which utilities can solve the foundational challenges of the transition. The traditional one-way energy flow from generation to transmission to distribution to customer has provided clear roles for network owners and operators.

article thumbnail

IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices

The Security Ledger

Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors - many owned by Chinese firms - process discarded hardware and data with little oversight. The post IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices appeared first on The. Read the whole entry. » Related Stories Resolve to fix your Online Security Mess in 2020.

article thumbnail

Overdrive CEO, Steve Potash, makes the case for public libraries

CILIP

Overdrive founder and CEO, Steve Potash makes the case for Public Libraries. Steve Potash, Lord John Bird, Bobby Seagull, Johanna Brinton Abela and Erica Lazzaro at the launch of Public Libraries: The Case for Support. Overdrive founder and CEO, Steve Potash, makes the case for Public Libraries. We are thankful for the leadership and initiative of Lord John Bird and the Big Issue, Nick Poole from CILIP, and all the supporting agencies that produced the findings in Public Libraries: The Case for

article thumbnail

Think differently about data privacy to deliver digital transformation

Collibra

Data privacy isn’t about compliance — it’s about customers. Although much of the ink spilled around data privacy focuses on obeying regulations such as the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), it’s a mistake to think about data privacy as a compliance exercise. To take this approach is to miss an opportunity. 75% of organizations consider the safeguarding of customers’ data privacy to be a competitive differentiator, according to a survey

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Community hubs keep libraries in the heart of local users

CILIP

Community hubs keep libraries in the heart of local users. Community hubs keep libraries in the heart of local users. It is no secret that public libraries have been hit hard by austerity. Local Authorities across the country are having to deal with huge reductions in their spending power as central government puts the brakes on public spending. Library Authorities have had to find their own way through, making difficult decisions that affect staff and customers.

article thumbnail

Microsoft Patches Major Crypto Spoofing Bug

Threatpost

January Patch Tuesday tackles 50 bugs, with eight rated critical, all as it pushes out its last regular Windows 7 patches.

IT 61
article thumbnail

Is This the Winter of Our eDiscovery Business Confidence Discontent?: eDiscovery Trends

eDiscovery Daily

It’s that time again! I’m here to cover the results of the Winter 2020 eDiscovery Business Confidence Survey, published (as always) on Rob Robinson’s terrific Complex Discovery site. So, how confident are individuals working in the eDiscovery ecosystem in the business of eDiscovery? Let’s see. As always, Rob provides a complete breakdown of the latest survey results, which you can check out here.