Wed.Dec 04, 2019

article thumbnail

Cybersecurity Defenders: Channel Your Adversary's Mindset

Data Breach Today

Black Hat Europe Speakers Urge Attendees to Know Attacker Tools and Techniques A clear theme Wednesday throughout the first day of the Black Hat Europe conference was the importance of approaching the design and defense of networks and systems by thinking like the enemy.

article thumbnail

Striking a balance between security and usability of sensitive data

OpenText Information Management

Last year, the number of personal records exposed by cyber attacks on the financial services industry was an incredible 446,575,334 – more than triple from the year before. The financial and reputational damage from these data breaches can be immense. However, customers are increasingly demanding more personalized and engaging experiences. That means being able to … The post Striking a balance between security and usability of sensitive data appeared first on OpenText Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The iPhone 11 Pro’s Location Data Puzzler

Krebs on Security

One of the more curious behaviors of Apple’s new iPhone 11 Pro is that it intermittently seeks the user’s location information even when all applications and system services on the phone are individually set to never request this data. Apple says this is by design, but that response seems at odds with the company’s own privacy policy.

Privacy 203
article thumbnail

The Hidden Cost of a Third-Party Data Breach

Data Breach Today

Breaches That Involve a Third-Party are Much More Expensive Than Those That Don't Your best bet to avoiding the potentially exorbitant costs of a vendor hack is to not have one in the first place.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Early holiday comes to Southfield family through Bike-a-Thon

OpenText Information Management

For many children, a brand new bicycle tops their holiday gift lists. As part of our dedication to giving back to the community, OpenText and Mastercard recently teamed up to help a local family make their children’s holiday wishes come true. Employees from the two companies worked together to custom-build bicycles for the six children … The post Early holiday comes to Southfield family through Bike-a-Thon appeared first on OpenText Blogs.

93

More Trending

article thumbnail

Questions you need to ask before buying a shelving system

TAB OnRecord

Purchasing a new shelving system for file folders and other media is not an easy task. There are so many options available and all with different features and benefits. Unfortunately, choosing the wrong shelving system can have a huge impact on the business – it can reduce worker efficiency, increase operating costs, and jeopardize security [.] Read More.

article thumbnail

Digital Transformation: The Privileged Access Imperative

Data Breach Today

As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key component of transformation.

article thumbnail

Two malicious Python libraries were stealing SSH and GPG keys

Security Affairs

The Python security team removed two trojanized Python libraries from PyPI (Python Package Index) that were stealing SSH and GPG keys from the projects of infected developers. The Python security team removed two t ainted Python libraries from PyPI (Python Package Index) that were found stealing SSH and GPG keys from the projects of infected developers.

article thumbnail

GOP Federal Privacy Bill Would Supersede CCPA

Data Breach Today

Sen. Roger Wicker Seeks Single Set of National Requirements After several moves by Democrats to introduce federal privacy legislation, Republican Senator Roger Wicker on Tuesday unveiled a draft consumer privacy bill, the United States Consumer Data Privacy Act of 2019, that would override various state laws on privacy, including the California Consumer Privacy Act.

Privacy 162
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Ewoks Are the Most Tactically Advanced Fighting Force in Star Wars

WIRED Threat Level

Hate them or love them, the Ewoks have more strategic chops than any military in the Star Wars galaxy.

article thumbnail

FBI Warns of Smart TV Dangers

Data Breach Today

Cameras, Microphones and Security Flaws - A Bad Recipe The FBI has a new suspect in its sights, and there's one in nearly every home: smart TVs. It warns consumers to be wary because the devices can pose privacy and security threats - an unsecured smart TV could be the avenue hackers use to gain access to a home network.

Privacy 167
article thumbnail

OpenText Magellan and Platform 3 Solutions

OpenText Information Management

The modern enterprise is a jungle of interconnected legacy systems, business unit applications, and technology platforms. Many enterprises have hundreds, or even thousands of disparate technologies running on their networks. Such a bloated technology landscape requires extensive budget to maintain, and prevents IT staff from concentrating on new priorities and innovation.

IT 72
article thumbnail

FaceApp Could Pose 'Counter-Intelligence Threat': FBI

Data Breach Today

Authorities Raise Concerns About Potential Russian Access to Data The Federal Bureau of Investigation warns that the photo-editing app FaceApp and other applications developed in Russia could be a "potential counter-intelligence threat" to the U.S.

Access 147
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptoassets and Smart Contracts – UK Offers Legal Clarity

Data Matters

On November 18, 2019, the UK Jurisdiction Taskforce, which is part of The English Law Society’s LawTech Delivery Panel , published its Legal Statement on the status of cryptoassets and smart contracts (the Legal Statement). In his foreword to the consultation paper that preceded the Legal Statement, 1 the Chancellor of the High Court, Sir Geoffrey Vos, stated that in his view, “[s]mart contracts will only finally take off when market participants and investors have confidence in them” and that “

article thumbnail

PSD2: The Compliance and Enforcement Update

Data Breach Today

The EU's second Payments Services Directive is alive and well. But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020.

article thumbnail

Cryptoassets and Smart Contracts – UK Offers Legal Clarity

Data Matters

On November 18, 2019, the UK Jurisdiction Taskforce, which is part of The English Law Society’s LawTech Delivery Panel , published its Legal Statement on the status of cryptoassets and smart contracts (the Legal Statement). In his foreword to the consultation paper that preceded the Legal Statement, 1 the Chancellor of the High Court, Sir Geoffrey Vos, stated that in his view, “[s]mart contracts will only finally take off when market participants and investors have confidence in them” and that “

article thumbnail

How to reduce cost and risk in capital projects

OpenText Information Management

According to McKinsey, nine out of ten large infrastructure projects go over budget. In 73% of the cases, this is because of poor project execution. And what’s at the center of poor execution? Poor document management. In one study, three-quarters of respondents said that project document issues caused overruns on their projects, and 25% said … The post How to reduce cost and risk in capital projects appeared first on OpenText Blogs.

Risk 57
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Iran-Linked APT groups target energy, industrial sectors with ZeroCleare Wiper

Security Affairs

Experts spotted a piece of malware dubbed ZeroCleare that has been used in highly targeted attacks aimed at energy and industrial organizations in the Middle East. Security experts at IBM X-Force found a piece of malware dubbed ZeroCleare (the name ZeroCleare comes from the path in the binary file) that has been used in highly targeted attacks aimed at energy and industrial organizations in the Middle East.

article thumbnail

Tensions between IT security and operations adding to data risks

Information Management Resources

Strained relationships between security and IT operations teams leave businesses vulnerable to disruption, even with increased spending on IT security and management tools.

IT 64
article thumbnail

CyrusOne, one of the major US data center provider, hit by ransomware attack

Security Affairs

Ransomware attacks continue to threaten organizations worldwide, CyrusOne , one of the biggest data center providers in the US, is facing with an infection. A new ransomware attack made the headlines, systems at CyrusOne , one of the biggest data center providers in the US, were infected by the malware. The company reported the incident to law enforcement, it hired forensics firms to investigate the attack.

article thumbnail

Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts

Threatpost

Prosecution asks for imprisonment of the hacker who stole nude photos and other personal data from women’s iCloud accounts and then distributed some of the material online.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hackers Find Ways Around a Years-Old Microsoft Outlook Fix

WIRED Threat Level

Microsoft patched a vulnerability in Microsoft Outlook in 2017. It hasn't slowed hackers down. .

IT 78
article thumbnail

EFF Talks the Corporate Surveillance of Consumers

Threatpost

The EFF explains how data is being tracked and used on the web and mobile devices, how consumers can protect themselves - and why it's not all bad news.

article thumbnail

The RCS Texting Protocol Is Way Too Easy to Hack

WIRED Threat Level

Rich Communication Services promises to be the new standard for texting. Thanks to sloppy implementation, it's also a security mess.

article thumbnail

Nebraska Medicine Breached By Rogue Employee

Threatpost

Nebraska Medicine is warning that a rogue, former employee accessed patients' medical records, Social Security numbers and more.

Access 55
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Five Best Practices For Conducting Fast, Defensible Internal Investigations

Zapproved

The post Five Best Practices For Conducting Fast, Defensible Internal Investigations appeared first on Zapproved.

52
article thumbnail

Iran Targets Mideast Oil with ZeroCleare Wiper Malware

Threatpost

Likely the work of APT34, ZeroCleare is bent on destruction and disruption, rather than information-stealing.

60
article thumbnail

Microsoft Issues Advisory for Windows Hello for Business

Dark Reading

An issue exists in Windows Hello for Business when public keys persist after a device is removed from Active Directory, if the AD exists, Microsoft reports.

59