Fri.Sep 14, 2018

article thumbnail

Europe Catches GDPR Breach-Notification Fever

Data Breach Today

Privacy Law is Fast Revealing the True Extent of Data Breaches Across UK and EU Less than four months after GDPR went into enforcement, Europe has arguably entered the modern data breach era. Reports of data breaches continue to increase and breached organizations now face the specter of class-action lawsuits over material as well as non-material damages.

GDPR 235
article thumbnail

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

In March 2018, the city of Atlanta fell victim to a ransomware attack that shut down its computer network. City agencies were unable to collect payment. Police departments had to handwrite reports. Years of data disappeared. Related: Political propaganda escalates in U.S. The attack also brought cybersecurity to the local level. It’s easy to think of it as a problem the federal government must address or something that enterprises deal with, but cybersecurity has to be addressed closer to home,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Equifax Breach: Key Lessons Learned

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of a new Government Accountability Office report on the causes of last year's massive Equifax breach. Also: An update on the role of tokenization in protecting payments.

article thumbnail

Quantum Computing and Cryptography

Schneier on Security

Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Intel Patches Firmware Flaw That Leaks ME Encryption Keys

Data Breach Today

Researcher Finds Intel's Previous Management Engine Patches Weren't Foolproof Intel has had a challenging time of late on the vulnerability front. It has issued yet another patch for its Management Engine after a researcher was able to extract two types of encryption keys. The problem was a repeat of one that Intel patched just least year.

More Trending

article thumbnail

FreshMenu Hid Data Breach Affecting 110,000 Users

Data Breach Today

CEO Took Two Years to Acknowledge Incident FreshMenu, a food delivery provider based in India, has come under social media attack for keeping under wraps a data breach two years ago that exposed the personal information of over 110,000 users.

article thumbnail

Reflective Practice and Threat Modeling (Threat Model Thursday)

Adam Shostack

Lately, I’ve been asking what takes threat modeling from a practice to a mission. If you’re reading this blog, you may have seen that some people are nearly mad about threat modeling. The ones who say “you’re never done threat modeling.” The ones who’ve made it the center of their work practice. What distinguishes those people from those who keep trying to teach developers about the difference between a hactivist and a script kiddie?

IT 80
article thumbnail

Are State AGs Picking Up Slack in HIPAA Enforcement?

Data Breach Today

States Apparently More Active in Breach Settlement Activity than HHS This Year Is a recent HIPAA settlement issued by the New York state attorney general's office another sign that states might begin to overshadow federal regulators when it comes to enforcement actions involving health data security and privacy?

Privacy 157
article thumbnail

How Secure are our Voting Systems for November 2018?

Dark Reading

Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the country's highly decentralized voting systems to safeguard the integrity of upcoming elections.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Iran-Linked OilRig APT group targets high-ranking office in a Middle Eastern nation

Security Affairs

Researchers from the Unit42 at Palo Alto Networks observed Iran-Linked OilRig APT group targeting high-ranking office in a Middle Eastern nation. The Iran-linked APT group OilRig continues to very active, it continues to improve the weapons in its arsenal. The OilRig hacker group has been around since at least 2015, since then it targeted mainly organizations in the financial and government sectors, in the United States and Middle Eastern countries.

article thumbnail

Five Weakest Links in Cybersecurity That Target the Supply Chain

Threatpost

Third-party breaches have become an epidemic as cybercriminals target the weakest link. Organizations such as BestBuy, Sears, Delta and even NYU Medical Center are just a few that have felt the impact of cyberattacks through third-party vendors. The fallout from these breaches can be costly, as the average enterprise pays $1.23 million per incident, up […].

article thumbnail

Click Here to Kill Everybody Reviews and Press Mentions

Schneier on Security

It's impossible to know all the details, but my latest book seems to be selling well. Initial reviews have been really positive: Boing Boing , Financial Times , Harris Online , Kirkus Reviews , Nature , Politico , and Virus Bulletin. I've also done a bunch of interviews -- either written or radio/podcast -- including the Washington Post , a Reddit AMA , " The 1A " on NPR, Security Ledger , MIT Technology Review , CBC Radio , and WNYC Radio.

article thumbnail

Military, Government Users Just as Bad About Password Hygiene as Civilians

Dark Reading

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Researchers Heat Up Cold-Boot Attack That Works on All Laptops

Threatpost

The attack bypasses BIOS mitigations for cold-boot compromise on models from Apple, Dell, Lenovo and all others made in the last 10 years.

article thumbnail

EternalBlue Infections Persist

Dark Reading

Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.

74
article thumbnail

E.U.: Tech Giants Face Big Fines, 1 Hour Limit to Remove Extremist Content

Threatpost

The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if they’re not based there.

article thumbnail

Guccifer to Be Extradited to US for Prison Sentence

Dark Reading

Four-year, four-month term will follow a longer sentence in hacker's home country of Romania.

83
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What’s Next in Engineering Technology? Part 3

Synergis Software

In the two previous articles in this series, I’ve taken a look at short-term trends regarding design tools , and explained how I look for what’s next in IT. In the third and final part, I want to share my current observations about the next big wave of innovation. I use the ideas of “stacks” as my metaphor to understand how specific technologies interact to create new rounds of innovation.

article thumbnail

Cybersecurity Is Only 1 Part of Election Security

Dark Reading

Protecting the 2018 election cycle means fixing the information infrastructure.

article thumbnail

Magecart Threat Group Racks Up More Hack Victims

Threatpost

The threat group has racked up a list of victims including Feedify, Groopdealz and British Airways.

74
article thumbnail

6 Tips for Protecting and Preserving Your Backup Media

Archive Document Data Storage

Every business needs a data backup plan. But data protection doesn’t end after your data is backed up. Here are several tips for protecting and preserving your backup media: Tip 1: Don’t Take Media Home. Many small business owners take their backup media home with them. If you’re one of them, ask yourself the following question: What will happen to your data if tapes are stolen from your car or left on a bus or train?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Decade-Old Attack Can Break the Encryption of Most PCs

WIRED Threat Level

The computer industry thought cold boot hacks were solved 10 years ago. Researchers have proven that's not the case.

article thumbnail

Weekly Update 104

Troy Hunt

We're on a boat! This week, Scott Helme is back in town so I'm treating him to a rare sight for the Englishman - sunshine ??. We're also talking about my.NET Conf talk, Chrome's visual changes (and rolling back some of them), the FreshMenu data breach, getting better at filtering CSP reports, the effectiveness of public shaming, the kayo.moe credential stuffing list and lastly, Scott talks about his blog post on protecting sites from modified JavaScript (now linked to in the references below).

article thumbnail

Saving Money with Azure Migrations

Daymark

With end of extended support for Windows Server 2008/2008 R2 and SQL Server 2008/2008 R2 quickly approaching within the next year, Microsoft has announced a program that will provide an additional 3 years of extended support if these workloads are migrated to Azure. Since this announcement in July, customers have been trying to figure out the most efficient way to migrate these workloads to Azure while preventing any security or compliance issues.

article thumbnail

FTC Gives Final Approval to Settlement with Phone Maker BLU

IG Guru

The Federal Trade Commission has given final approval to a settlement with mobile phone manufacturer BLU Products, Inc. and its co-owner over allegations that they deceived consumers about the disclosure of their personal information and BLU’s data security practices. In its complaint, the FTC alleges that BLU and its co-owner and President Samuel Ohev-Zion falsely claimed that they limited […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hire a Document Scanning Company or DIY?

Armstrong Archives

The world has gone digital, and there’s no going back. If your company is still operating in the dark ages, it’s time to meet modern customers in the middle. You can better predict and fulfill customer needs with digital recordkeeping and secure data storage. Give your brand the gift of going digital with help from professional document scanners for the easiest, most pain-free transition.

Paper 40
article thumbnail

Y Soft Announces 45% Sales Growth in FY2018

Info Source

B rno, Czech Republic and Dallas, Texas – September 13, 2018 – Y Soft® Corporation, a leading enterprise office solution provider, today announced that its sales volume for fiscal year 2018 (July 2017 to June 2018) grew by 45% over fiscal year 2017 to (USD) 45 million including subscriptions, nearly 1 Billion in Czech Crowns, attributed in part to its multi-product platform strategy and SaaS pricing model.

Sales 40
article thumbnail

Inside Synthetic Fraud: New Industry White Paper

Rippleshot

Synthetic fraud is estimated to cost lenders more than $6 billion annually — and by all accounts, this problem is going to get worse before it gets better. But why is synthetic fraud ballooning – and why are financial institutions finding it increasingly harder to crack down on? A rise in data breaches in recent years has only complicated this problem even more.

Paper 40