Thu.Jan 24, 2019

article thumbnail

Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey.

GDPR 269
article thumbnail

Eliminate the challenges of binding: Jamf Connect now integrates with Azure Active Directory

Jamf

Now with one username and password, organizations have the ability to provide users with a simple, unified authentication and account synchronization process — while still offering the best possible Apple experience. Read the full details.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI Agents Say Shutdown is Damaging Cyber Investigations

Data Breach Today

Funding Holdups for Subpoenas and Confidential Sources are Interrupting Probes FBI agents say the government shutdown is impeding their investigations, including cybersecurity probes, with the lack of funding compromising their ability to pay confidential informants, and obtain warrants or subpoenas.

article thumbnail

French CNIL Fines Google €50m for Violation of GDPR’s Transparency and Consent Requirements

Data Matters

On January 21, 2019, the French Supervisory Authority (the “ Commission Nationale de l’Informatique et des Libertés ” or “ CNIL ”) issued Google’s U.S. headquarters (“ Google ”) with a fine of €50m for failure to comply with the EU General Data Protection Regulation’s (“ GDPR ”) fundamental principles of transparency and legitimacy. The CNIL found that the general structure of Google’s privacy policy and terms & conditions was too complex for the average user and that Google, by using pre-ti

GDPR 76
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Police Arrest €10 Million IOTA Cryptocurrency Theft Suspect

Data Breach Today

Scheme Offered 'Free' Website for Generating Cryptocurrency Wallet Seeds Police in England have arrested a 36-year-old man as part of an investigation into the theft of at least €10 ($11.3 million) in IOTA cryptocurrency since January 2018 from 85 victims worldwide, perpetrated via a malicious cryptocurrency seed generation website that stored users' private keys.

221
221

More Trending

article thumbnail

Government Shutdown: Impact on Health Data Security, Privacy

Data Breach Today

HIPAA Enforcement Agency Open, But Regulatory Activity Slows Down Some regulatory activity related to health data privacy and security is on hold as a result of the partial government shutdown. But the agency that enforces HIPAA remains open.

article thumbnail

Military Carrier Pigeons in the Era of Electronic Warfare

Schneier on Security

They have advantages : Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity of microSD memory cards, a pigeon's organic characteristics provide front line forces a relatively clandestine mean to transport gigabytes of video, voice, or still imagery and documentation over considerable distance with zero electromagnetic emissions or obvious detectability to radar.

article thumbnail

Why Cybersecurity Must Be a Top Priority for Small & Midsize Businesses

Dark Reading

The big corporations may grab the headlines, but America's SMBs have the most to lose in the aftermath of a data breach.

article thumbnail

SHARE@ Phoenix 2019 – Enterprise DevOps and Mainframe Application Modernization

Micro Focus

SHARE Phoenix runs from March 10-15. Are you going? We sure are – as a Platinum Premier Partner. But why? And why should you join us at booth #410 in the Expo Hall? Micro Focus believes in SHARE, the leading IBM mainframe user conference, and regularly attend, sponsor and present at SHARE events across North. View Article.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The perils and promise of fast data

IBM Big Data Hub

A new Forrester Consulting study commissioned by IBM from October 2018 shows that fast data with fast analytics is an enormous, rapidly growing resource that’s not being used to its full potential.

article thumbnail

EST: The Forgotten Standard

Thales Cloud Protection & Licensing

We have seen an explosion in certificate use in recent years. This is partly due to the trend towards miniaturization. The monolithic applications of old are now deployed as dozens of micro-services on platforms like Kubernetes. These applications scale up and down to meet demand, creating hundreds or thousands of instances at peak times. All these instances need to prove their identity to each other, as well as third parties.

article thumbnail

Collateral Damage: When Cyberwarfare Targets Civilian Data

Dark Reading

You can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises - as a means of attacking rival government targets.

article thumbnail

Kaspersky links GreyEnergy and Zebrocy activities

Security Affairs

Security experts from Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) linked the GreyEnergy malware with and the Zebrocy backdoor. Security researchers from Kaspersky Lab’s ICS CERT have discovered a link between GreyEnergy malware with and the Zebrocy tool. The activity of the GreyEnergy APT group emerged in concurrence with BlackEnergy operations, experts consider the formed a successor of the latter group.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

My Health Record: government warned of 'significant' patient data glitch

The Guardian Data Protection

Exclusive: Leaked document says problem potentially left personal medical information out of date or missing, but agency says safety not compromised Government officials were warned a “significant” technical glitch affecting the My Health Record system threatened to leave patient information incomplete or out of date, a leaked briefing shows. The My Health Record system relies on doctors and medical practices using their own IT systems to upload clinical information about patients , to help ensu

article thumbnail

Bit-and-Piece DDoS Method Emerges to Torment ISPs

Threatpost

Perpetrators are using smaller, bit-and-piece methods to inject junk into legitimate traffic, causing attacks to bypass detection rather than sounding alarms with large, obvious attack spikes.

article thumbnail

Cisco addresses flaws in its products, including Small Business routers and Webex

Security Affairs

Cisco released security updates for several products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small Business routers. Cisco released security updates to address security flaws in several products including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small Business routers.

IT 73
article thumbnail

Five Benefits of an Automation Framework for Data Governance

erwin

Organizations are responsible for governing more data than ever before, making a strong automation framework a necessity. But what exactly is an automation framework and why does it matter? In most companies, an incredible amount of data flows from multiple sources in a variety of formats and is constantly being moved and federated across a changing system landscape.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FRANCE: A new phase in European privacy law enforcement – CNIL fined Google LLC 50 million euros!

DLA Piper Privacy Matters

By Denise Lebeau-Marianna , Caroline Chancé and Alexandre Balducci. On 21 January 2019, the restricted committee of the French Data Protection Supervisory Authority (CNIL) fined Google LLC 50 million euros for breaching GDPR for lack of transparency, inadequate information and lack of valid consent regarding personalized advertising. . This is the first decision rendered by the CNIL under GDPR and the largest penalty pronounced by a EU data protection supervisory authority against a company fo

Privacy 71
article thumbnail

After Eight Years, Metasploit Gets Its First Major Update

Dark Reading

Metasploit 5.0 offers a host of service-oriented features, along with a new commitment from Rapid7 for regular releases.

IT 86
article thumbnail

One of America’s largest retail banks re-signs with TAB to upgrade to FusionRMS v10

TAB OnRecord

TAB is pleased to announce that a large American retail bank with over 2 million paper records has upgraded from TAB FusionRMS v9.3 to v10. The bank has been using FusionRMS to track several databases of servicing and custodial records throughout the organization. Upgrading to v10 helps the bank further optimize loan management processes, specifically [.

Retail 60
article thumbnail

Cloud Customers Faced 681M Cyberattacks in 2018

Dark Reading

The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices.

IoT 82
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Stop assembling puzzles and start transforming your business processes

OpenText Information Management

When was the last time you put a large puzzle together? You know, those mega, 1000-piece puzzles that can occupy you for hours and days? While you probably don’t do puzzles in the office, I’ll wager that your team probably works on challenging puzzles similar to these every day. The puzzles I am referring to … The post Stop assembling puzzles and start transforming your business processes appeared first on OpenText Blogs.

article thumbnail

Fighting Fire with Fire: API Automation Risks

Threatpost

A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.

Risk 72
article thumbnail

EU-JAPAN: Let the data flow! Free flow of personal data between EU countries and Japan confirmed

DLA Piper Privacy Matters

On 23 January 2019, the European Commission adopted its decision finding that the level of data protection in the EU and Japan are equivalent. In parallel, Japan adopted its equivalent decision. It is the first time ever that such reciprocal adequacy decisions are adopted. These adequacy decisions create the world’s largest data area of safe data flows and will boost commercial opportunities for European and Japanese companies by facilitating the transfer of their data.

article thumbnail

Database of 24 Million Mortgage, Loan Records Left Exposed Online

Dark Reading

Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

ThreatList: Credential-Sniffing Phishing Attacks Erupted in 2018

Threatpost

Credential compromise emerged the main target for phishing campaigns in 2018 - rather than infecting victims' devices with malware.

article thumbnail

Cyberattackers Bait Financial Firms with Google Cloud Platform

Dark Reading

A new wave of attacks abuses the Google Cloud Platform URL redirection in PDF decoys, sending users to a malicious link.

Cloud 74
article thumbnail

Personal Information of 4 Million Intern Applications Exposed

Adam Levin

The personal data of 4 million applicants for internships at a non-profit organization was exposed in a breach. The data included the applicants’ names, email addresses, gender, and personal essays and was exposed via a misconfigured database called Elasticsearch on the website of AIESEC, a “youth-run” non-governmental organization with over 100,000- members worldwide.

IoT 50