Fri.Jun 29, 2018

article thumbnail

Equifax Coder Settles Insider Trading Charges With SEC

Data Breach Today

Software Engineer Profited From Breach Knowledge, Regulator Alleges An Equifax software engineer has settled an insider trading charge with the U.S. Securities and Exchange Commission after he allegedly earned $77,000 after he made a securities transaction based on his suspicion that the credit bureau had suffered a data breach.

article thumbnail

8 Highlights: Scottish 'Big Data' Cybersecurity Conference

Data Breach Today

Cloud Forensics, Fraud, Extortion and Cyber Sociology Dominate Edinburgh Event What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.

Big data 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Shuffling Paperwork Ruining Your Day?

OpenText Information Management

Early in my career, I was a freelance writer and market researcher. I spent a sizable chunk of my work week sending and receiving paperwork that wasn’t my actual work – invoices, tax forms, and so forth. It was the bane of my existence. I grew up photocopying documents, filling out and signing forms in … The post Is Shuffling Paperwork Ruining Your Day?

article thumbnail

HealthEngine's Latest Problem: A Data Breach

Data Breach Today

Coding Error Exposed Identifying Information In Medical Practice Reviews Australian medical booking service HealthEngine says late Friday it notified 75 users of a breach that may have exposed some identifying information. The data breach is the latest in a string of problems for HealthEngine, which was caught tampering with patient reviews and using questionable marketing tactics.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

On June 28, 2018, California Gov. Jerry Brown signed into law the California Consumer Privacy Act of 2018 (AB 375). According to the bill’s author, it was consciously designed to emulate the new European General Data Protection Regulation (GDPR) that went into effect on May 25, and if and when it goes into effect, it would constitute the broadest privacy law in the United States.

GDPR 79

More Trending

article thumbnail

Weekly podcast: Exactis, BetVictor, Ticketmaster, and GDPR complaints

IT Governance

This week, we discuss the apparent leak of 340 million data records, a vulnerability that exposed sensitive BetVictor data, a data breach affecting up to 40,000 Ticketmaster customers, and the number of GDPR complaints since 25 May. Hello and welcome to the IT Governance podcast for Friday, 29 June 2018. Here are this week’s stories. Exactis, a Florida-based marketing and data aggregation company, has reportedly exposed a database containing 340 million data records via a publicly accessible ser

GDPR 76
article thumbnail

Intelligent Records Management Requires a New Way of Thinking

Gimmal

Technology is an enabler for sure. But w ithout the right resources and direction, it can also be an inhibiter. Once an enterprise decides that all corporate information has the potential of being a corporate asset, the next step is to establish a continuous program to identify, improve, and protect this asset just like any other.

article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

On June 28, 2018, California Gov. Jerry Brown signed into law the California Consumer Privacy Act of 2018 (AB 375). According to the bill’s author, it was consciously designed to emulate the new European General Data Protection Regulation (GDPR) that went into effect on May 25, and if and when it goes into effect, it would constitute the broadest privacy law in the United States.

GDPR 60
article thumbnail

Wikimedia v. NSA Highlights the ACLU's Challenges in Fighting Mass Surveillance

WIRED Threat Level

The ACLU has been trying to challenge the NSA's bulk surveillance for years. A hearing in *Wikimedia v. NSA* Friday could mark a breakthrough.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Is distance learning right for you?

IT Governance

Distance learning is often considered the backup option for those who can’t attend classroom-based courses, and although it certainly does fill that need for a lot of people, it doesn’t have to be your second choice. You might find that some of the benefits of online study make it more appealing than travelling to a classroom-based course. Benefits of distance learning.

article thumbnail

The 6 Worst Insider Attacks of 2018 - So Far

Dark Reading

Stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the hurt on some very high-profile employers.

78
article thumbnail

Conservation of Threat

Schneier on Security

Here's some interesting research about how we perceive threats. Basically, as the environment becomes safer we basically manufacture new threats. From an essay about the research: To study how concepts change when they become less common, we brought volunteers into our laboratory and gave them a simple task ­-- to look at a series of computer-generated faces and decide which ones seem "threatening.

article thumbnail

California Consumer Privacy Act Signed, Introduces Key Privacy Requirements for Businesses

Hunton Privacy

On June 28, 2018, the Governor of California signed AB 375 , the California Consumer Privacy Act of 2018 (the “Act”). The Act introduces key privacy requirements for businesses, and was passed quickly by California lawmakers in an effort to remove a ballot initiative of the same name from the November 6, 2018, statewide ballot. We previously reported on the relevant ballot initiative.

Privacy 55
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EUROPE: Domain names and WHOIS information in a post-GDPR world (gTLDs update)

DLA Piper Privacy Matters

By Claire Sng (Senior Associate, London) and John Wilks (Partner, London). With the General Data Protection Regulation (GDPR) having taken effect across the EU on 25 May 2018, this has meant a big change to the availability of WHOIS data (ie data recording – among other things – the persons who own domain names). See an earlier DLA Piper article published last month on this topic here.

GDPR 55
article thumbnail

Why Sharing Intelligence Makes Everyone Safer

Dark Reading

Security teams must expand strategies to go beyond simply identifying details tied to a specific threat to include context and information about attack methodologies.

article thumbnail

Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again

Threatpost

The attack allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.

Access 51
article thumbnail

Exactis Knows Everything about You and They Just Got Breached

Adam Levin

If the reports are accurate, a Florida-based marketing and data company exposed sensitive personal data belonging to 340 million records. The gravity of the situation is yet to be confirmed or even discussed by Exactis, but the leak is estimated to include 230 million consumers and 110 million businesses. If confirmed, this breach involves basically everyone in the United States.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Weekly Update 93

Troy Hunt

Geez it's nice to be home! I took a ride on the jet ski today which was just one of those typically perfect Gold Coast winters days at a balmy 24C. I cruised around the ocean with a pod of dolphins (probably a dozen of them), grabbed some prawns for lunch (not those "shrimp" you get other places, proper big prawns ), then sat down here and enjoyed the serenity: I’ve really gotta stay home more ??

article thumbnail

Adidas US Website Hit by Data Breach

Dark Reading

The athletic apparel firm was hacked and data on potentially 'millions' of customers now at risk.

article thumbnail

Data readiness is much more than mere cleanliness

Information Management Resources

It is about orchestrating at scale the intra- and inter-enterprise information flows, from systems and applications throughout the organization and across the world, that create business value.

IT 47
article thumbnail

Natural Language Processing Fights Social Engineers

Dark Reading

Researchers used natural language processing to detect malicious content in more than 187,000 phishing and non-phishing emails.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again

Threatpost

The attack allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.

Access 41
article thumbnail

California passes major legislation, expanding consumer privacy rights and legal exposure for US and global companies

Data Protection Report

On June 28, 2018, California lawmakers enacted the California Consumer Privacy Act of 2018 (the “CCPA”) a sweeping, GDPR-like privacy law which is intended to give California consumers more control over how businesses collect and use their data. The new law is set to take effect on January 1, 2020 which means the California legislature may still consider changes to the new law in the coming months and years.

Privacy 40
article thumbnail

Choosing the right programming language for machine learning algorithms with Apache Spark

OpenText Information Management

When it comes to writing machine learning algorithms leveraging the Apache Spark framework, the data science community is fairly divided as to which language is best suited for writing programs and applications. As a widely used open source engine for performing in-memory large-scale data processing and machine learning computations, Apache Spark supports applications written in Scala, Python, Java, and R. … The post Choosing the right programming language for machine learning algorithms w

article thumbnail

NYDFS Cybersecurity Regulation to Apply to Consumer Reporting Agencies

Hunton Privacy

On June 25, 2018, the New York Department of Financial Services (“NYDFS”) issued a final regulation (the “Regulation”) requiring consumer reporting agencies with “significant operations” in New York to (1) register with NYDFS for the first time and (2) comply with the NYDFS’s cybersecurity regulation. Under the Regulation, consumer reporting agencies that reported on 1,000 or more New York consumers in the preceding year are subject to these requirements, and must register with NYDFS on or befor

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Better insights. Better decisions.

OpenText Information Management

The OpenText™ team has spent the last year enriching the OpenText eDOCS user experience ? giving users more choice and more flexibility in how they work. We’ve launched a new dashboard interface called eDOCS InfoCenter and a new mobile app ? so users can work when and how they want ? delivering better, faster service to their … The post Better insights.

article thumbnail

California Passes Major Legislation, Expanding Consumer Privacy Rights and Legal Exposure for US and Global Companies

Data Protection Report

On June 28, 2018, California lawmakers enacted the California Consumer Privacy Act of 2018 (the “CCPA”) a sweeping, GDPR-like privacy law which is intended to give California consumers more control over how businesses collect and use their data. The new law is set to take effect on January 1, 2020 which means the California legislature may still consider changes to the new law in the coming months and years.

Privacy 40
article thumbnail

Driving supply chain innovation and customer success at Enterprise World 2018

OpenText Information Management

Only a few days to go until OpenText™ hosts its largest conference of the year, Enterprise World 2018 in Toronto – but there is still time to register. OpenText™ Business Network will be hosting thirty informative breakout sessions on how we enable intelligent and connected digital ecosystems around the world, and this year we have a … The post Driving supply chain innovation and customer success at Enterprise World 2018 appeared first on OpenText Blogs.

IT 40