Mon.May 13, 2019

Equifax's Data Breach Costs Hit $1.4 Billion

Data Breach Today

Massive 2017 Breach Continues to Bite the Credit Reporting Giant's Bottom Line Equifax has reported a loss in its latest quarter due to ongoing incident response, legal, investigative and corporate information security overhaul costs resulting from its 2017 data breach.

A Cisco Router Bug Has Massive Global Implications

WIRED Threat Level

Researchers have discovered a way to break one of Cisco's most critical security features, which puts countless networks at potential risk. Security Security / Cyberattacks and Hacks

Risk 113

Nigerian BEC Scammers Use Malware to Up the Ante

Data Breach Today

Business Email Compromise Schemes Get More Sophisticated A growing area of concern for security researchers is a new crop of business email compromise schemes originating from Nigeria, with scammers upping their game by using new malware.

4 top technology sources for building an AI-enabled enterprise

Information Management Resources

IT leaders are overwhelmed by the sheer number of available tools and technologies to choose from. They often struggle to understand the differences between them and how each will fit their specific business needs. Artificial intelligence Data strategy Machine learning

Tools 112

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Anthem Cyberattack Indictment Provides Defense Lessons

Data Breach Today

More Trending

Passwordless MongoDB Database Exposes 275 Million Records

Data Breach Today

Reverse Engineering a Chinese Surveillance App

Schneier on Security

Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. The details are fascinating, and chilling. Boing Boing post. china privacy reverseengineering surveillance

IRS Gives Hacked Accounting Software Customers a Reprieve

Data Breach Today

7-Day Extension Offered to Users of Wolters Kluwer CCH Software After Attack Good news for customers of accounting software vendor Wolters Kluwer: The IRS has given you a 7-day extension to submit several different types of filings.

Cloud 182

Expert discovered how to brick all Samsung mobile phones

Security Affairs

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones.

How To 108

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack. Data security Cyber security Cyber attacks Malware

CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

Security Affairs

Security experts have found a race condition vulnerability (CVE-2019-11815) in Linux Kernel Prior to 5.0.8 that expose systems to remote code execution. Linux systems based on kernel versions prior to 5.0.8

Reltio Cloud – Your Key to a Successful SAP S/4HANA Migration


Guy Vorster, Principal Solutions Consultant, Reltio. Weekends don’t get any more entertaining than a good game of rugby. And I’ll let you in on a secret, we talk business too!

Cloud 94

12 ways AI will revolutionize healthcare in the next year

Information Management Resources

Partners HealthCare ranks the ‘Disruptive Dozen’ technologies that will most benefit medicine over the next year. Artificial intelligence Radiology Medical imaging Clinical decision support Deep learning HIE EHR analysis

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The power of combining AI and analytics for manufacturers

OpenText Information Management

Artificial Intelligence (AI) has become one of the hottest topics in manufacturing today. The range of business and operational applications that it can be put to is almost limitless. Yet, it’s fair to say that we’re still very early in the AI adoption curve.

Companies must start creating human-machine collaborations

Information Management Resources

We see virtual personal assistants in many employees’ futures, taking on predictable, rote tasks such as meeting scheduling, note-taking, and to-do nagging. Artificial intelligence Machine learning Data management

Over 10k+ GPS trackers could be abused to spy on individuals in the UK

Security Affairs

A vulnerability in a GPS tracker used by elderly people and kids could be exploited by an attacker to spy on individuals using it. Researchers at Fidus Information Security discovered a vulnerability in GPS trackers used by elderly people and kids could be exploited to spy on them.

Use of unsecure email account causes breach at UMC Physicians

Information Management Resources

Two employees at UMC Physicians in Lubbock, Texas, were forwarding emails to an unsecured Google mail account after they established a Google shared drive to track follow-up tasks. Data breaches Protected health information HIPAA regulations

Reading the Yoroi Cyber Security Annual Report 2018

Security Affairs

Yoroi Cyber Security Annual Report 2018 – In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure to be the most aggressive and pervasive threat.

Facebook's Clegg dismisses co-founder Hughes's call for breakup

Information Management Resources

Facebook’s challenges can be tackled through regulation, not by breaking up the company, a company official wrote Saturday in the New York Times. Social media Customer data Facebook

Data 82

ThreatList: Top 5 Most Dangerous Attachment Types


From ZIP attachments spreading Gandcrab, to DOC files distributing Trickbot, researchers tracked five widescale spam campaigns in 2019 that have made use of malicious attachments.

Big digital boosts small commercial lines

Information Management Resources

Insurers trying to reach entrepreneurs are trying more data-driven automation to speed the process. Commercial lines Digital distribution Digital transformation

Unprotected DB exposed PII belonging to nearly 90% of Panama citizens

Security Affairs

Personally identifiable information belonging to roughly 90% of Panama citizens were exposed on a poorly configured Elasticsearch server.

Preparing for PIM

Information Management Resources

Learn about launching a successful PIM, product MDM, or data quality program. Data quality

MDM 78

(Executives) Text Messages Must Be Preserved

IG Guru

via JD Supra – 4/29/2019 Whether we like it or not, a reality of today’s world is that often important business is conducted by text messages.

IT 70

Elon Musk’s brain tech startup is raising more cash

Information Management Resources

Neuralink, a small and secretive brain computing startup founded by Elon Musk, has raised $39 million of a planned $51 million funding round. Cognitive computing Artificial intelligence Machine learning

Promoting Threat Modeling Work

Adam Shostack

Quick: are all the flowers the same species? People regularly ask me to promote their threat modeling work, and I’m often happy to do so, even when I have questions about it.

Video 70

Low computer skills make for an uneven race against the robots

Information Management Resources

A report from the OECD shows a sharp contrast in the extent to which workers in different countries engage with technology, whether writing emails or programming. Hardware and software Data management Data strategy

These are the Top 5 Network Challenges of 2019. Are You Ready?


With the volume of data that organizations collect expected to grow tenfold over the next six years, the challenge of accommodating so much new data while providing acceptable service levels and doing it all on a budget is front-and-center for IT executives.

Facebook sues data analytics firm Rankwave over alleged data misuse

Security Affairs

Facebook sues South Korean data analytics firm Rankwave over alleged data misuse and violation of social network’s rules. Facebook filed a lawsuit against Rankwave in a California State court in Silicon Valley to verify if the analytics firm is violating the rules of the social network giant.

Want great digital leaders in your organization? Look for these traits

DXC Technology

Enterprise leaders spend a lot of time trying to determine which technologies will best enable digital transformation. Likewise, they give a lot of thought to the types of skills employees need now and in the future to help their organizations meet strategic business objectives, often devoting considerable time and expense to recruiting and/or training. But […]. Career Digital Transformation Leadership and Success Workplace digital leadership enterprise leadership

Yee Haw! Texas lawyers must be competent in technology under revised rule 1.01

OpenText Information Management

The Texas Bar recently became the 36th State to codify what the American Bar Association (ABA) Model Rules of Professional Responsibility did in 2012 by adding very specific language about attorney competency and technology.

Blog 65