Mon.May 13, 2019

Equifax's Data Breach Costs Hit $1.4 Billion

Data Breach Today

Massive 2017 Breach Continues to Bite the Credit Reporting Giant's Bottom Line Equifax has reported a loss in its latest quarter due to ongoing incident response, legal, investigative and corporate information security overhaul costs resulting from its 2017 data breach.

A Cisco Router Bug Has Massive Global Implications

WIRED Threat Level

Researchers have discovered a way to break one of Cisco's most critical security features, which puts countless networks at potential risk. Security Security / Cyberattacks and Hacks

Risk 110

Nigerian BEC Scammers Use Malware to Up the Ante

Data Breach Today

Business Email Compromise Schemes Get More Sophisticated A growing area of concern for security researchers is a new crop of business email compromise schemes originating from Nigeria, with scammers upping their game by using new malware.

Strengthening Our Salesforce Capabilities with Sundog Interactive

Perficient Data & Analytics

Today, Perficient announced it is planning to acquire Sundog Interactive, an award-winning marketing and technology consulting firm that delivers Salesforce solutions to the world’s leading manufacturers.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Anthem Cyberattack Indictment Provides Defense Lessons

Data Breach Today

More Trending

Passwordless MongoDB Database Exposes 275 Million Records

Data Breach Today

Reverse Engineering a Chinese Surveillance App

Schneier on Security

Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. The details are fascinating, and chilling. Boing Boing post. china privacy reverseengineering surveillance

IRS Gives Hacked Accounting Software Customers a Reprieve

Data Breach Today

7-Day Extension Offered to Users of Wolters Kluwer CCH Software After Attack Good news for customers of accounting software vendor Wolters Kluwer: The IRS has given you a 7-day extension to submit several different types of filings.

Cloud 175

CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

Security Affairs

Security experts have found a race condition vulnerability (CVE-2019-11815) in Linux Kernel Prior to 5.0.8 that expose systems to remote code execution. Linux systems based on kernel versions prior to 5.0.8

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Reltio Cloud – Your Key to a Successful SAP S/4HANA Migration

Reltio

Guy Vorster, Principal Solutions Consultant, Reltio. Weekends don’t get any more entertaining than a good game of rugby. And I’ll let you in on a secret, we talk business too!

Cloud 94

Over 10k+ GPS trackers could be abused to spy on individuals in the UK

Security Affairs

A vulnerability in a GPS tracker used by elderly people and kids could be exploited by an attacker to spy on individuals using it. Researchers at Fidus Information Security discovered a vulnerability in GPS trackers used by elderly people and kids could be exploited to spy on them.

4 top technology sources for building an AI-enabled enterprise

Information Management Resources

IT leaders are overwhelmed by the sheer number of available tools and technologies to choose from. They often struggle to understand the differences between them and how each will fit their specific business needs. Artificial intelligence Data strategy Machine learning

Tools 113

Reading the Yoroi Cyber Security Annual Report 2018

Security Affairs

Yoroi Cyber Security Annual Report 2018 – In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure to be the most aggressive and pervasive threat.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

The power of combining AI and analytics for manufacturers

OpenText Information Management

Artificial Intelligence (AI) has become one of the hottest topics in manufacturing today. The range of business and operational applications that it can be put to is almost limitless. Yet, it’s fair to say that we’re still very early in the AI adoption curve.

ThreatList: Top 5 Most Dangerous Attachment Types

Threatpost

From ZIP attachments spreading Gandcrab, to DOC files distributing Trickbot, researchers tracked five widescale spam campaigns in 2019 that have made use of malicious attachments.

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack. Data security Cyber security Cyber attacks Malware

Promoting Threat Modeling Work

Adam Shostack

Quick: are all the flowers the same species? People regularly ask me to promote their threat modeling work, and I’m often happy to do so, even when I have questions about it.

Video 70

Unprotected DB exposed PII belonging to nearly 90% of Panama citizens

Security Affairs

Personally identifiable information belonging to roughly 90% of Panama citizens were exposed on a poorly configured Elasticsearch server.

(Executives) Text Messages Must Be Preserved

IG Guru

via JD Supra – 4/29/2019 Whether we like it or not, a reality of today’s world is that often important business is conducted by text messages.

IT 69

Facebook sues data analytics firm Rankwave over alleged data misuse

Security Affairs

Facebook sues South Korean data analytics firm Rankwave over alleged data misuse and violation of social network’s rules. Facebook filed a lawsuit against Rankwave in a California State court in Silicon Valley to verify if the analytics firm is violating the rules of the social network giant.

Yee Haw! Texas lawyers must be competent in technology under revised rule 1.01

OpenText Information Management

The Texas Bar recently became the 36th State to codify what the American Bar Association (ABA) Model Rules of Professional Responsibility did in 2012 by adding very specific language about attorney competency and technology.

Blog 65

12 ways AI will revolutionize healthcare in the next year

Information Management Resources

Partners HealthCare ranks the ‘Disruptive Dozen’ technologies that will most benefit medicine over the next year. Artificial intelligence Radiology Medical imaging Clinical decision support Deep learning HIE EHR analysis

Want great digital leaders in your organization? Look for these traits

DXC Technology

Enterprise leaders spend a lot of time trying to determine which technologies will best enable digital transformation. Likewise, they give a lot of thought to the types of skills employees need now and in the future to help their organizations meet strategic business objectives, often devoting considerable time and expense to recruiting and/or training. But […]. Career Digital Transformation Leadership and Success Workplace digital leadership enterprise leadership

Companies must start creating human-machine collaborations

Information Management Resources

We see virtual personal assistants in many employees’ futures, taking on predictable, rote tasks such as meeting scheduling, note-taking, and to-do nagging. Artificial intelligence Machine learning Data management

Pair of Cisco Bugs, One Unpatched, Affect Millions of Devices

Threatpost

The two high-severity bugs impact a wide array of enterprise, military and government networks. Vulnerabilities Cisco Cisco IOS XE Software CVE-2019-1649 CVE-2019-1862 hardware root of trust Secure Boot unpatched vunerabilities Web UI

These are the Top 5 Network Challenges of 2019. Are You Ready?

InfoGoTo

With the volume of data that organizations collect expected to grow tenfold over the next six years, the challenge of accommodating so much new data while providing acceptable service levels and doing it all on a budget is front-and-center for IT executives.

Facebook's Clegg dismisses co-founder Hughes's call for breakup

Information Management Resources

Facebook’s challenges can be tackled through regulation, not by breaking up the company, a company official wrote Saturday in the New York Times. Social media Customer data Facebook

Data 85

The Quality Coach, Developer’s Friend, Product Owner’s Helper and All-Round Great Quality Engineer

AIIM

As a project manager that specializes in digital software products, I will let you in on a secret about a new role, a new type of person that is emerging in the ranks—and it’s all good news for your project.

Big digital boosts small commercial lines

Information Management Resources

Insurers trying to reach entrepreneurs are trying more data-driven automation to speed the process. Commercial lines Digital distribution Digital transformation

Attacks on JavaScript Services Leak Info From Websites

Dark Reading

Three marketing tools, including the Best Of The Web security logomark, were compromised in supply chain attacks, allegedly leaving website customers leaking their users' sensitive information

Use of unsecure email account causes breach at UMC Physicians

Information Management Resources

Two employees at UMC Physicians in Lubbock, Texas, were forwarding emails to an unsecured Google mail account after they established a Google shared drive to track follow-up tasks. Data breaches Protected health information HIPAA regulations