Thu.Dec 27, 2018

article thumbnail

Ron Ross of NIST on Protecting Critical Infrastructure

Data Breach Today

Sizing Up the Threats and Reviewing the Mitigation Effort In an increasingly complex world of interconnected information systems and devices, more must be done to protect critical infrastructure, says Ron Ross of the National Institute of Standards and Technology.

186
186
article thumbnail

4 Questions Every Professional Should Ask About Their CRM System

AIIM

Every organization wants to increase agility and productivity by extracting maximum value from its processes and content. Organizations need to bridge the silos created by disparate lead applications to seamlessly pull structured and unstructured information together and present the whole story to the customer relationship management (CRM) users who need it.

ECM 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pan Am Flight 103: Robert Mueller’s 30-Year Search for Justice

WIRED Threat Level

In December 1988 a bomb downed a Pan Am jet, leaving 270 dead. It was the first mass killing of Americans by terrorists. As the head of the Justice Department’s criminal division, Robert Mueller oversaw the case. And for him, it was personal.

IT 95
article thumbnail

A new Shamoon 3 sample uploaded to VirusTotal from France

Security Affairs

A new sample of Shamoon 3 was uploaded on December 23 to the VirusTotal platform from France, it is signed with a Baidu certificate. A new sample of the dreaded Shamoon wiper was uploaded on December 23 to the VirusTotal platform from France. This sample attempt to disguise itself as a system optimization tool developed by Chinese technology company Baidu.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2018: The Year Machine Intelligence Arrived in Cybersecurity

Dark Reading

Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year - setting the stage for growing intelligence in security automation for 2019.

More Trending

article thumbnail

Toxic Data: How 'Deepfakes' Threaten Cybersecurity

Dark Reading

The joining of 'deep learning' and 'fake news' makes it possible to create audio and video of real people saying words they never spoke or things they never did.

article thumbnail

Android Pie introduces important security and privacy enhancements

Security Affairs

The latest version of Google OS, Android Pie, implements significant enhancements for cybersecurity, including a stronger encryption and authentication. Google experts worked on OS hardening and the implementation of anti-exploitation mechanisms with a great attention to the user privacy. The tech giant updated the File-Based Encryption implementing the support for external storage media, it also included the metadata encryption with hardware support.

Privacy 81
article thumbnail

IoT Bug Grants Access to Home Video Surveillance

Dark Reading

Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos.

IoT 83
article thumbnail

Market volume of illegal online sales of alcohol exceeded 30 million USD in 2018 in Russia

Security Affairs

Security firm Group-IB has estimated that the market volume of illegal online sales of alcohol in Russia exceeded 30 million USD in 2018, i.e. almost 5.8 million USD (+23%) more than in 2017. Group-IB Brand Protection team discovered a total of around 4,000 websites illegally selling alcohol. Criminals create entire networks from the “mirror–websites” of their online alcohol stores; if one site is blocked, they swiftly migrate to a backup resource.

Sales 63
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CNIL Fines Uber for Data Security Failure Related to 2016 Data Breach

Hunton Privacy

On December 20, 2018, the French data protection authority (the “CNIL”) announced that it levied a €400,000 fine on Uber France SAS, the French establishment of Uber B.V. and Uber Technologies Inc., for failure to implement some basic security measures that made possible the 2016 Uber data breach. Background. On November 21, 2017, Uber Technologies Inc. published an article on its website revealing that two external individuals had accessed the personal data of 57 million Uber riders and drivers

article thumbnail

Privacy Law Showdown Between Congress and Tech Looms in 2019

WIRED Threat Level

Lawmakers spend the better part of 2018 talking tough to tech companies. Now the pressure is on for Congress to act.

Privacy 64
article thumbnail

FTC Warns of Netflix Phishing Scam Making Rounds

Threatpost

The scam targets Netflix users and asks for payment information.

article thumbnail

Document Scanning vs Digitizing: What They Are, the Differences, and the Benefits

Record Nations

While the two terms are often used interchangeably, there are a number of unique benefits and differences between scanning and digitizing. In this video learn more about what it means to scan vs digitize a document, how each process works, and the advantages of both methods for converting paper documents to digital. What’s the Difference? […].

Paper 48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How SMBs can tap artificial intelligence for business gains

Information Management Resources

Businesses of any size can use AI to transform their marketing, customer service, human relations, IT, sales and administration without spending more funds.

article thumbnail

Nova says listeners' personal data has been leaked

The Guardian Data Protection

Media company says information it collected from 2009 to 2011 has been ‘publicly disclosed’ Media company Nova Entertainment says information it collected from listeners in Australia over a two-year period has been “publicly disclosed”. The company said it recently became aware listener information from May 2009 to October 2011 had been leaked and it was in the process of contacting those affected.

article thumbnail

Three key trends that will change cybersecurity strategies in 2019

Information Management Resources

As we approach 2019, here are three major shifts that security teams and organizations alike can expect.

article thumbnail

Looking Back At Information Governance in 2018

Everteam

2018 was the year enterprises started seriously investing in their information governance programs. It’s not that they didn’t do governance before, but the increase in compliance and regulations, including the new privacy regulations has pushed for improvements to how enterprise think about and apply information governance processes. It has been a key focus for us at Everteam.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Are You Ready for Brazil’s New Data Protection Law?

HL Chronicle of Data Protection

The Brazilian General Data Protection Law (“Lei Geral de Proteção de Dados” or “LGPD”), passed by Congress on 14 August 2018, will come into effect on 15 February 2020. The new data protection law significantly improves Brazil’s existing legal framework by regulating the use of personal data by the public and private sectors. Very similar to the General Data Protection Regulation (“GDPR”) implemented in the European Union, the LGPD imposes strict regulations on the collection, use, processing, a

article thumbnail

Planning Your Information Governance Technology Strategy

IG Guru

By Dan Griffith As part of your Information Governance strategy, you need a technology strategy. This is something many organizations struggle with partly because there are so many different technologies available that can help and they don’t know where to start. Your information governance technology strategy is a key element of your overall governance strategy […].

article thumbnail

Stealing Nativity Displays

Schneier on Security

The New York Times is reporting on the security measures people are using to protect nativity displays.

article thumbnail

The Most-Read Security Stories of 2018

WIRED Threat Level

This year saw the most devastating cyberattack in history, a gang of teen hackers, and so much Mueller news.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Building on DocuWare's 2018 Success

Docuware

2018 was a time of tremendous growth at DocuWare. Significant changes include the release of DocuWare version 7 with its fourth-generation cloud architecture, our first customer appreciation week and a leadership transition that went into effect on January 1. The next phase of DocuWare’s expansion will be led by newly appointed co-presidents, Dr. Michael Berger, who was previously the company’s Chief Technology Officer, and Max Ertl who served as the company’s Chief Revenue Officer.

Cloud 37
article thumbnail

Farmers balk at digital moves from ADM, Cargill

Information Management Resources

Facing competition from startups, the trading houses are seeking approval to create a joint digital network designed to let farmers manage their data online. But growers are wary.

30
article thumbnail

Mayor La Guardia Welcomes 1941

Archives Blogs

A rousing introduction to 1941 by New York City Mayor Fiorello H. La Guardia. Although there’s a little problem with the balance of volume between His Honor is the live band by the end. Nevertheless, “New York City is America!

30
article thumbnail

How AI, data and analytics aid in retailers' post-Christmas return woes

Information Management Resources

More companies are using artificial intelligence and machine learning to tackle the holidays' returns challenge.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hackers infect Linux servers with JungleSec Ransomware via IPMI Remote console

Security Affairs

Since November, a new ransomware called JungleSec has been infecting servers through unsecured IPMI (Intelligent Platform Management Interface) cards. Security experts at BleepingComputer wrote about a new ransomware called JungleSec that is infecting victims through unsecured IPMI (Intelligent Platform Management Interface) cards. The ransomware was first observed early November.

article thumbnail

Report: Trump Weighs Executive Order Banning Huawei, ZTE

Data Breach Today

Move Would Prohibit All US Use of Chinese Manufacturers' Telecommunications Gear President Donald Trump is reportedly continuing to weigh an executive order that would ban all U.S. organizations from using telecommunications hardware built by China's Huawei and ZTE. Australia and New Zealand have blocked the firms from their 5G rollouts, while other nations weigh similar moves.

article thumbnail

Debate Continues on the Future of US Privacy Regulation from California to Capitol Hill

Data Matters

With the midterm election out of the way, legislators on Capitol Hill and in state capitols are getting ready to consider the future of data privacy regulation in 2019 and consumer and industry groups continue to weigh in on the ongoing debate. The debate has begun to move from principles and frameworks to drafting of legislative language. In Washington, key leaders of congressional committees from both parties indicated that privacy legislation will be on their agendas in the next Congress.

Privacy 68