Fri.Oct 18, 2019

Emerging Technologies vs. Disruptive Technologies

InfoGoTo

Recently, there has been a lot of buzz surrounding emerging and disruptive technologies. Many of these innovations involve modern technologies such as artificial intelligence (AI), robots, blockchain , internet of things (IoT), 3D printing and biometrics, just to name a few. The term “emerging technology” is pretty self-explanatory, but an emerging technology doesn’t always become a disruptive technology. So what’s the difference, and where do they intersect?

Healthcare E-Commerce Site Breach Undetected for Years

Data Breach Today

Mission Health Says Patient Medical Data Was Not Exposed A North Carolina-based healthcare organization has reportedly discovered that malicious code had been contained on its e-commerce site for three years, sending consumers' payment information to unauthorized individuals

IT 173

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

I Got a New Job in Records Management, Now What?

The Texas Record

As a person who recently earned a job as a Government Information Analyst with the Texas State Library and Archives Commission (TSLAC), I had no idea how complex records management would be.

Sodinokibi Ransomware Gang Appears to Be Making a Killing

Data Breach Today

Researchers Traces Bitcoins Paid to Ransomware-as-a-Service Operation Affiliates Sodinokibi/REvil appears to be making millions since it seized the ransomware-as-a-service mantle from GandCrab earlier this year.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Adding a Hardware Backdoor to a Networked Computer

Schneier on Security

Interesting proof of concept : At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept version of that hardware hack in his basement.

More Trending

Glitching: The Hardware Attack that can Disrupt Secure Software

Dark Reading

Glitching (or fault-injection) attacks aren't easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of your cybersecurity planning

IoT 73

Russia-Linked Cyber Espionage Group APT29 Remains Active

Data Breach Today

Why Technologists Need to Get Involved in Public Policy

Schneier on Security

Last month, I gave a 15-minute talk in London titled: " Why technologists need to get involved in public policy.". In it, I try to make the case for public-interest technologists. (I I also maintain a public-interest tech resources page , which has pretty much everything I can find in this space.

IT 72

Malicious Tor Bowser Fleeces Darknet Users of Bitcoins

Data Breach Today

Cybercriminals Have Stolen About $40,000 So Far, Researchers Say ESET researchers have uncovered a new cybercriminal scheme that uses a trojanized version of the Tor Browser for stealing bitcoins from darknet users.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

2019 Gartner Magic Quadrant for Metadata Management Solutions

erwin

erwin positioned as a Leader in Gartner’s “2019 Magic Quadrant for Metadata Management Solutions”. We were excited to announce earlier today that erwin was named as a Leader in the @Gartner _inc “2019 Magic Quadrant for Metadata Management Solutions.”.

Domain 'Typosquatting' Hits 2020 US Elections

Data Breach Today

Report Finds 550 Fraudulent Election Domains Connected to Presidential Race Digital Shadows researchers have found at least 550 fraudulent domains aimed at users who accidentally mistype the URL for a political candidate or election-related group.

141
141

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

Security Affairs

A tainted version of the Tor Browser is targeting dark web market shoppers to steal their cryptocurrency and gather information on their browsing activity.

Did you know? AMC Monthly Newsletter

Micro Focus

Welcome to October, where we’ll celebrate COBOL@60, and introduce our new TechTip webinar series, technology updates, and must-read industry articles. Let’s go! Missed our COBOL60 birthday celebration webinar? No worries – catch the replay here.

66

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Researcher released PoC exploit code for CVE-2019-2215 Android zero-day flaw

Security Affairs

A researcher has published a proof-of-concept (PoC) exploit code for the CVE-2019-2215 zero-day flaw in Android recently addressed by Google. Earlier October, Google Project Zero researchers Maddie Stone publicly disclosed a zero-day vulnerability , tracked as CVE-2019-2215, in Android.

Calendar Formats Added to Format Guidance

National Archives Records Express

“Women’s Activities – Industry – Munitions – Remington Arms Co. through Willys-Morrow Co.” ” 1/7/1919. National Archives Identifier: 45567258.

Systems at Ingredients provider Ingredion infected with a Malware

Security Affairs

The US ingredient provider Ingredion Incorporated announced that it has recently detected suspicious activity associated with a malware attack.

Is your law firm ready for a data breach?

OpenText Information Management

Security breaches are so prevalent that most enterprises believe it’s not a matter of if but when they’ll experience a breach. This is significant given that the average cost of a data breach is estimated at $3.92 million.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Pitney Bowes revealed that its systems were infected with Ryuk Ransomware

Security Affairs

The global shipping and mailing services company Pitney Bowes revealed that the recent partial outage was caused by the Ryuk ransomware. The global shipping and mailing services company Pitney Bowes recently suffered a partial outage of its service caused by a ransomware attack.

6 ways artificial intelligence is revolutionizing document management

Information Management Resources

AI has the ability to make every step of the workflow better, smarter and faster — from the processing of documents to their storage to the extraction of the information they contain. Artificial intelligence Document management Data management

China-linked cyberspies Turbine PANDA targeted aerospace firms for years

Security Affairs

Security firm revealed that China-linked APT group Turbine Panda conducted cyber-espionage operations aimed at various aerospace firms for years. Security researchers at Crowdstrike conducted long-running cyber-espionage operations aimed at various aerospace firms.

CenturyLink Customer Data Exposed

Dark Reading

Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report

60

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Workplace Trends: Age Is but a Number

InfoGoTo

There are researchers who spend their days studying generations. They name them, find similarities and define their labels so we can understand each. We look to these labels and their subsequent traits to market to , manage and interact with each specific group of people.

Learn About the Underground World of Anti-Cheats at Black Hat Europe

Dark Reading

Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption

Decrypting Basic Encryption — A Layperson’s Guide to Words and Phrases

InfoGoTo

Most people recognize that basic encryption is vital to protecting the organization. But, what is basic encryption? Here are some basic encryption words and phrases for everyone to use with confidence. Ciphertext is encrypted text. Plaintext is decrypted text. You’re reading plaintext right now.). Encryption and decryption keys lock and unlock encrypted data, respectively. A password can “turn” a decryption key.

Tor Weaponized to Steal Bitcoin

Dark Reading

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise

Threatpost

A patch is currently under revision but has not yet been incorporated into the Linux kernel. Vulnerabilities critical flaw Kernel Linux linux kernel linux system Realtek unpatched vulnerability WiFi

80

7 views on the important lessons of Cybersecurity Awareness Month

Information Management Resources

This month is National Cybersecurity Awareness Month, a time for organizations and individuals alike to think about their data, likely security threats and best practice defense strategies. Cyber security Data security Cyber attacks

Pitney-Bowes the Target of Ransomware

Adam Levin

mailing services company Pitney-Bowes experienced services outages after a ransomware attack earlier this week. “It It has been confirmed that our systems have been affected by a malware attack that encrypted information on some systems and disrupted client access to our services.