Fri.Oct 18, 2019

Emerging Technologies vs. Disruptive Technologies


Recently, there has been a lot of buzz surrounding emerging and disruptive technologies. Many of these innovations involve modern technologies such as artificial intelligence (AI), robots, blockchain , internet of things (IoT), 3D printing and biometrics, just to name a few. The term “emerging technology” is pretty self-explanatory, but an emerging technology doesn’t always become a disruptive technology. So what’s the difference, and where do they intersect?

Healthcare E-Commerce Site Breach Undetected for Years

Data Breach Today

Mission Health Says Patient Medical Data Was Not Exposed A North Carolina-based healthcare organization has reportedly discovered that malicious code had been contained on its e-commerce site for three years, sending consumers' payment information to unauthorized individuals

IT 130

2019 Gartner Magic Quadrant for Metadata Management Solutions


erwin positioned as a Leader in Gartner’s “2019 Magic Quadrant for Metadata Management Solutions”. We were excited to announce earlier today that erwin was named as a Leader in the @Gartner _inc “2019 Magic Quadrant for Metadata Management Solutions.”.

Russia-Linked Cyber Espionage Group APT29 Remains Active

Data Breach Today

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Why Technologists Need to Get Involved in Public Policy

Schneier on Security

Last month, I gave a 15-minute talk in London titled: " Why technologists need to get involved in public policy.". In it, I try to make the case for public-interest technologists. (I I also maintain a public-interest tech resources page , which has pretty much everything I can find in this space.

IT 52

More Trending

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef

Schneier on Security

It's likely the diamondback squid. There's a video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid video

Domain 'Typosquatting' Hits 2020 US Elections

Data Breach Today

Report Finds 550 Fraudulent Election Domains Connected to Presidential Race Digital Shadows researchers have found at least 550 fraudulent domains aimed at users who accidentally mistype the URL for a political candidate or election-related group.


Systems at Ingredients provider Ingredion infected with a Malware

Security Affairs

The US ingredient provider Ingredion Incorporated announced that it has recently detected suspicious activity associated with a malware attack.

Sodinokibi Ransomware Gang Appears to Be Making a Killing

Data Breach Today

Researchers Traces Bitcoins Paid to Ransomware-as-a-Service Operation Affiliates Sodinokibi/REvil appears to be making millions since it seized the ransomware-as-a-service mantle from GandCrab earlier this year.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Calendar Formats Added to Format Guidance

National Archives Records Express

“Women’s Activities – Industry – Munitions – Remington Arms Co. through Willys-Morrow Co.” ” 1/7/1919. National Archives Identifier: 45567258.

Fresh Privacy Legislation Would Jail CEOs for Violations

Data Breach Today

Senate Bill Would Give Consumers Control of How Their Personal Data Gets Used New legislation introduced by Sen. Ron Wyden, D-Ore., would "bring meaningful punishments for companies that violate people's data privacy, including larger fines and potential jail time for CEOs," he says.

Pitney-Bowes the Target of Ransomware

Adam Levin

mailing services company Pitney-Bowes experienced services outages after a ransomware attack earlier this week. “It It has been confirmed that our systems have been affected by a malware attack that encrypted information on some systems and disrupted client access to our services.

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

Security Affairs

A tainted version of the Tor Browser is targeting dark web market shoppers to steal their cryptocurrency and gather information on their browsing activity.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

OpenText Core Experience Insights unveiled

OpenText Information Management

We’re pleased to announce the availability of OpenText™ Core Experience Insights, a SaaS application that provides marketing leaders full visibility over their customer’s journey – from website interactions to email engagement, social media content and call center performance.

Workplace Trends: Age Is but a Number


There are researchers who spend their days studying generations. They name them, find similarities and define their labels so we can understand each. We look to these labels and their subsequent traits to market to , manage and interact with each specific group of people.

Is your law firm ready for a data breach?

OpenText Information Management

Security breaches are so prevalent that most enterprises believe it’s not a matter of if but when they’ll experience a breach. This is significant given that the average cost of a data breach is estimated at $3.92 million.

China-linked cyberspies Turbine PANDA targeted aerospace firms for years

Security Affairs

Security firm revealed that China-linked APT group Turbine Panda conducted cyber-espionage operations aimed at various aerospace firms for years. Security researchers at Crowdstrike conducted long-running cyber-espionage operations aimed at various aerospace firms.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Strategies for the Preservation and Production of Audio Recordings via Lexology

IG Guru

A large manufacturer of consumer products invests in new technology to record, store and analyze customer service calls.

Adding a Hardware Backdoor to a Networked Computer

Schneier on Security

Interesting proof of concept : At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept version of that hardware hack in his basement.

Did you know? AMC Monthly Newsletter

Micro Focus

Welcome to October, where we’ll celebrate COBOL@60, and introduce our new TechTip webinar series, technology updates, and must-read industry articles. Let’s go! Missed our COBOL60 birthday celebration webinar? No worries – catch the replay here.


Pitney Bowes revealed that its systems were infected with Ryuk Ransomware

Security Affairs

The global shipping and mailing services company Pitney Bowes revealed that the recent partial outage was caused by the Ryuk ransomware. The global shipping and mailing services company Pitney Bowes recently suffered a partial outage of its service caused by a ransomware attack.

Decrypting Basic Encryption — A Layperson’s Guide to Words and Phrases


Most people recognize that basic encryption is vital to protecting the organization. But, what is basic encryption? Here are some basic encryption words and phrases for everyone to use with confidence. Ciphertext is encrypted text. Plaintext is decrypted text. You’re reading plaintext right now.). Encryption and decryption keys lock and unlock encrypted data, respectively. A password can “turn” a decryption key.

Researcher released PoC exploit code for CVE-2019-2215 Android zero-day flaw

Security Affairs

A researcher has published a proof-of-concept (PoC) exploit code for the CVE-2019-2215 zero-day flaw in Android recently addressed by Google. Earlier October, Google Project Zero researchers Maddie Stone publicly disclosed a zero-day vulnerability , tracked as CVE-2019-2215, in Android.

Pulse of ITAD – Data Destruction: What are Your Options?


Data destruction is one of the most crucial components of an organization’s records and data management strategy. If end-of-life IT equipment is not disposed of in a secure manner, the aftermath can be significant. Consequences may include lost or stolen intellectual property, compliance violations, monetary penalties and/or criminal charges. Additionally, it can be damaging to a company’s reputation.

Why data and analytics experts choose SPSS Statistics

IBM Big Data Hub

One could argue that many of the world’s problems can be solved with data. While I won’t be able to save the world just yet, I’d like to explain how statistical analysts and data experts use tools to understand data and how this data can then be managed to influence our environment

Execs Could Face Jail Time For Privacy Violations


The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies. Government Privacy Data Privacy Data security Facebook FTC FTC fine mind your own business act

Glitching: The Hardware Attack that can Disrupt Secure Software

Dark Reading

Glitching (or fault-injection) attacks aren't easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of your cybersecurity planning

IoT 52