Tue.Apr 24, 2018

article thumbnail

Atlanta's Ransomware Cleanup Costs Hit $2.6 Million

Data Breach Today

Money Would Have Been Better Spent on Prevention, Experts Say The city of Atlanta's ransomware outbreak cleanup and response tab has hit $2.6 million, after a March attack froze corporate servers, employees' PCs and resident-facing portals. Experts say the breach response funds would have been put to better use preventing the outbreak in the first place.

Cleanup 185
article thumbnail

Cambridge University rejected Facebook study over 'deceptive' privacy standards

The Guardian Data Protection

Exclusive: panel told researcher Aleksandr Kogan that Facebook’s approach fell ‘far below ethical expectations’ A Cambridge University ethics panel rejected research by the academic at the centre of the Facebook data harvesting scandal over the social network’s “deceptive” approach to its users privacy, newly released documents reveal. A 2015 proposal by Aleksandr Kogan, a member of the university’s psychology department , involved the personal data from 250,000 Facebook users and their 54 milli

Privacy 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bringing Visibility to the Midmarket

Data Breach Today

SonicWall CEO Bill Conner on Efforts to Improve Cybersecurity for SME Increasingly, SonicWall is focused on the midmarket, and CEO Bill Conner wants to help ensure that smaller and midsized enterprises have appropriate visibility into the threat landscape - the threat actors, as well as whom they are targeting.

article thumbnail

Tech firms could face new EU regulations over fake news

The Guardian Data Protection

EU security commissioner says new regulations may have to be brought in if tech firms fail to tackle issues voluntarily Brussels may threaten social media companies with regulation unless they move urgently to tackle fake news and Cambridge Analytica-style use of personal data before the European elections in 2019. The EU security commissioner, Julian King, said “short-term, concrete” plans needed to be in place before the elections, when voters in 27 EU member states will elect MEPs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Role of AI and ML in Minimizing Alert Fatigue

Data Breach Today

Ted Julian of IBM Resilient Discusses Orchestration and Automation Alert fatigue is a serious problem in terms of risk management and security analyst turnover. Ted Julian of IBM Resilient discusses how artificial intelligence and machine learning can assist with orchestration and automation.

More Trending

article thumbnail

Analysis: 'Orangeworm' Attacks Appear to Involve Espionage

Data Breach Today

Corporate espionage appears to be the motive behind cyberattacks targeting a variety of medical-related equipment and systems, researcher Jon DiMaggio of Symantec says in an in-depth interview about the activities of a hacker group the company has dubbed "Orangeworm.

113
113
article thumbnail

A closer look at the GDPR’s technical requirements

IT Governance

The EU General Data Protection Regulation (GDPR) will soon be in effect, but many organisations are still working towards compliance. One part of the Regulation tripping people up is Article 32: Security of processing. It describes the technical and organisational measures that organisations should have in place, but it’s densely written and uses unfamiliar terms: Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as we

GDPR 71
article thumbnail

Symantec: 'Orangeworm' Group Hits Healthcare Organizations

Data Breach Today

Custom Backdoor Lands on X-Ray and MRI Machines Large healthcare companies in the U.S., Europe and Asia are getting hit with a backdoor that comes from a long-observed group, which Symantec calls Orangeworm. The backdoor has been found on X-ray machines and MRIs.

113
113
article thumbnail

A catastrophic cyber attack is imminent, says UK government

IT Governance

The head of the National Cyber Security Centre (NCSC), Ciaran Martin, has said that it is a matter of “when, not if” the UK suffers a category one cyber attack. Martin told the Guardian that he expects such an attack to take place in the next two years, and that the UK would be “fortunate” if it survived that long. The NCSC defines a category one cyber attack as an incident that disrupts critical infrastructure, the financial sector or an election.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Vulnerability Management: Why the Problem Can't Be Solved

Data Breach Today

86 Percent of Bugs Patchable Within 24 Hours, Says Flexera's Alejandro Lavie One measure of why it's so difficult for organizations to keep their software patched and better secured: Of the nearly 20,000 unique vulnerabilities in 2,000 products cataloged last year, only half involved Microsoft, Adobe, Java, Chrome or Firefox software, says Flexera's Alejandro Lavie.

Security 100
article thumbnail

Ransomware Attack Hits Ukrainian Energy Ministry, Exploiting Drupalgeddon2

Threatpost

The Ukrainian Energy Ministry has been hit by a ransomware attack – and for once it looks like this is the work of amateurs, not nation-state attackers bent on making a geopolitical point. However, the bad actors appear to have made use of the recently patched Drupal vulnerability, pointing out yet once again that patch […].

article thumbnail

SunTrust: 1.5 Million Clients' Details Potentially Stolen

Data Breach Today

Blame Insider Theft, 'Not a Data Breach,' Claims Atlanta Bank's CEO Great news: "SunTrust to offer free identity protection. at no cost on an ongoing basis." Of course, nothing comes for free, at least for 1.5 million customers of the Atlanta bank, whose personal details may have been sold to criminals by a former employee.

article thumbnail

Orangeworm Mounts Espionage Campaign Against Healthcare

Threatpost

A freshly minted attack group dubbed Orangeworm has been uncovered, deploying a custom backdoor in mostly healthcare-related environments. It’s bent on laser-focused, comprehensive corporate espionage, with a noisy attack vector that shows that it’s unlikely to be related to nation-state actors. Researchers first found Orangeworm in the form of an interesting binary in 2016, and […].

IT 65
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Microfilm and Microfiche Scanning Works

Record Nations

Microfilm and microfiche were once viewed as the gold standard in storing large amounts of data, whether it was preserving documents, photographs, books, newspapers, manuals, and other physical files. Both microfilm and microfiche use the same methodology: take tiny exposures of each page and store them in their minimized version to save physical space.

IT 73
article thumbnail

EDI – 50 years old and getting stronger

OpenText Information Management

There are many unusual facts about Electronic Data Interchange (EDI). The first is that its roots began when there weren’t really any computers to speak of. Another is that this 50-year-old technology is now more relevant today than it’s ever been. So where is EDI today and how did we get here? Army Master Sergeant … The post EDI – 50 years old and getting stronger appeared first on OpenText Blogs.

article thumbnail

Why you shouldn’t ignore the NIS Directive

IT Governance

By 9 May 2018, the Directive on security of network and information systems (NIS Directive) will have been transposed into UK law. However, unlike the EU General Data Protection Regulation (GDPR) (GDPR), which organisations are currently scrambling to comply with, there is little commotion about the NIS Directive. That’s partly because EU member states have until November 2018 to identify certain organisations that they deem to be within the Directive’s scope.

GDPR 58
article thumbnail

Analytics experts discuss AI's present and future

IBM Big Data Hub

Where is AI headed? How should you be thinking about AI? What should you be doing with AI? To answer these questions, we recently convened a round table of tech influencers to discuss some of the most burning issues arising from AI — starting with why we should think of it as “augmented intelligence” rather than “artificial intelligence.”.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Deconstructing the Possibilities and Realities of Enterprise IoT Security

Dark Reading

Organizations are rushing to leverage Internet of Things solutions but struggle to design the information technology architectures that will lock down the data these devices create.

IoT 49
article thumbnail

Computer Alarm that Triggers When Lid Is Opened

Schneier on Security

" Do Not Disturb " is a Macintosh app that send an alert when the lid is opened. The idea is to detect computer tampering. Wire article : Do Not Disturb goes a step further than just the push notification. Using the Do Not Disturb iOS app, a notified user can send themselves a picture snapped with the laptop's webcam to catch the perpetrator in the act, or they can shut down the computer remotely.

46
article thumbnail

It's Time to Take GitHub Threats Seriously

Dark Reading

There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.

IT 48
article thumbnail

Square 9® Announces New Release of GlobalSearch C2, Cloud Hosted Enterprise Content Management

Info Source

NEW HAVEN, CONN., April 24, 2018 – New Haven based Square 9® Softworks, Inc., announced today the new release of GlobalSearch® C2, a secure and compliant cloud hosted Enterprise Content Management (ECM) platform. GlobalSearch C2 is designed to capture and control business critical information in a variety of formats, providing users with enhanced access to shared content.

ECM 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cybersecurity Buzz Phrase Bingo

Dark Reading

The RSA Conference expo was chock full of vendors showing off their wares with language as colorful as the blinky lights on a SOC dashboard.

article thumbnail

Exploit Targets Nvidia Tegra-Based Nintendo Systems

Threatpost

Researchers have found an exploit in Nvidia Tegra X1-based systems that they say cannot be patched.

48
article thumbnail

Coviello: Modern Security Threats are 'Less About the Techniques'

Dark Reading

Today's attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.

article thumbnail

Baseball Code

Schneier on Security

Info on the coded signals used by the Colorado Rockies.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

MEDantex Healthcare Transcription Firm Accidentally Exposes Medical Records

Dark Reading

Exposed data likely the result of a flawed system rebuild after a recent ransomware attack on the company.

article thumbnail

Don’t Miss Our Webcast Today on Technology Assisted Review!: eDiscovery Webcasts

eDiscovery Daily

What is Technology Assisted Review (TAR)? Why don’t more lawyers use it? Find out in our webcast today! Today at noon CST (1:00pm EST, 10:00am PST), CloudNine will conduct the webcast Getting Off the Sidelines and into the Game using Technology Assisted Review. In this one-hour webcast that’s CLE-approved in selected states, will discuss what TAR really is, when it may be appropriate to consider for your case, what challenges can impact the use of TAR and how to get started.

article thumbnail

GDPR Solutions and Vendors

eSecurity Planet

IT solutions and vendors that can help businesses meet the EU's tough new data privacy regulation.

GDPR 40