Thu.Jan 23, 2020

Weathering the Privacy Storm from GDPR to CCPA & PDPA

Dark Reading

A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond


Ethical Use of Data for Training Machine Learning Technology - Part 1


This is the first part of a 3-part series on the Ethical Use of Data for Training Machine Learning Technology by guest authors Andrew Pery and Michael Simon. Part 1: Bad Things Can Come from Non-neutral Technology. AI technology is becoming pervasive , impacting virtually every facet of our lives.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Attitudes, actions around data privacy protections don't go far enough

Information Management Resources

An effective program to enable business to use data while also managing risk and ensuring compliance must reflect three interlocking components: privacy, data governance and risk management. Data privacy rules GDPR Data management

Risk 38

FBI Warns: Beware of Spoofed Job Application Portals

Data Breach Today

Fraudsters Targeting Personal Information, Including Payment Card Details The FBI's Internet Crime Complaint Center has issued an alert warning that fraudsters are using spoofed job application portals and websites to steal personal information, including payment card details, from would-be applicants.


The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Dark Reading

Attackers 'weaponized' Active Directory to spread the ransomware

More Trending

THSuite data leak exposes cannabis users information

Security Affairs

Experts found online an unsecured database owned by THSuite and used by point-of-sale systems in medical and recreational marijuana dispensaries.

Sales 99

Treasury Wants to Collect More Cyber Risk Details From Banks

Data Breach Today

Agency Wants to Gather More Data to Support Security of Financial Infrastructure The U.S. Treasury Department is proposing to collect more information from banks and financial markets about the cybersecurity risks they face to help ensure the security of financial infrastructure

Risk 195

Apple Abandoned Plans for Encrypted iCloud Backup after FBI Complained

Schneier on Security

This is new from Reuters: More than two years ago, Apple told the FBI that it planned to offer users end-to-end encryption when storing their phone data on iCloud, according to one current and three former FBI officials and one current and one former Apple employee.

POS Vendor for Cannabis Dispensaries Exposed Data: Report

Data Breach Today

Researchers Discovered Unsecured Database Accessible Via Internet A point-of-sale system vendor that serves U.S.

Sales 173

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

DHS Warns of Increasing Emotet Risk

Dark Reading

Emotet is considered one of the most damaging banking Trojans, primarily through its ability to carry other malware into an organization

Risk 88

Microsoft Error Exposed 250 Million Elasticsearch Records

Data Breach Today

Five Customer Service Databases Were Left Internet-Accessible for Three Weeks Microsoft accidentally internet-exposed 250 million customer support records stored in five misconfigured Elasticsearch databases, for three weeks.

Access 164

Iran-Linked PupyRAT backdoor used in recent attacks on European energy sector

Security Affairs

Hackers used a remote access Trojan (RAT) associated with Iran-linked APT groups in recent attacks on a key organization in the European energy sector.

Top 5 Life Sciences predictions in 2020

OpenText Information Management

With the patient taking center stage, digitization is gaining pace within Life Sciences. This blog looks at how digital technology is going to shape every stage of the drug lifecycle for life science and pharma companies in 2020.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Deconstructing Web Cache Deception Attacks: They're Bad; Now What?

Dark Reading

Expect cache attacks to get worse before they get better. The problem is that we don't yet have a good solution


250 Million Microsoft customer support records and PII exposed online

Security Affairs

An expert discovered that over 250 million Microsoft customer support records might have been exposed along with some personally identifiable information.

The Annoying MacOS Threat That Won't Go Away

Dark Reading

In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says


EUROPE: The Future of AI Regulation and Data Protection

DLA Piper Privacy Matters

A white paper has been leaked which provides an interesting insight into the European Union’s plans for the future regulation of artificial intelligence (“ AI ”).


B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

NSA Offers Guidance on Mitigating Cloud Flaws

Dark Reading

A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources

Cloud 74

Top technology predictions for the energy industry in 2020

OpenText Information Management

Uncertainty has become the new norm in the energy industry and 2020 promises more of the same.

Man pleads guilty for keeping classified records after employment via the Washington Post

IG Guru

This article brings to light the importance of ensuring access controls are in place for contractors and that vendors follow information handling best practices with their employees.

Severe Vulnerabilities Discovered in GE Medical Devices

Dark Reading

CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems


Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

AI-powered business intelligence: The future of analytics

IBM Big Data Hub

Teasing new O'Reilly thought leadership report being published this week. Will need help on 3 images used to drive to blog

Microsoft suffers data breach affecting up to 250 million people

IT Governance

Microsoft has confirmed a massive data breach affecting anonymised data held on its customer support database. Up to 250 million records were exposed online between 5 and 31 December as a result of the tech giant failing to implement proper protections. The information, which includes email addresses, IP addresses and support case details, was held on leaky Elasticsearch servers.

Relieving the Burden of Tax Reporting

Perficient Data & Analytics

Provisioning for income tax can be a complex process for large multi-national organizations to mid-sized companies with a consistent growth mode. The tax provisioning process involves determining the current tax amounts as well as calculating the deferred roll-forward amount.

Cisco Warns of Critical Network Security Tool Flaw


The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls. Vulnerabilities Web Security Cisco critical flaw CVE-2019-16028 Firepower Management Center firewall LDAP Lightweight Directory Access Protocol Network security security solution

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

[Guide] 3 Ways Cloud Is Modernizing Healthcare Data and Analytics

Perficient Data & Analytics

Driven by a growing need for timely information to support system interoperability and improve patient care, digital transformation in healthcare is rapidly evolving and driving the need for systems that can manage and organize large amounts of data.

Shlayer, No. 1 Threat for Mac, Targets YouTube, Wikipedia


The malware uses thousands of partner websites to spread malvertising code. Malware Web Security Adware Kaspersky mac users Malvertising Malware analysis no 1 threat partner network shlayer Trojan Wikipedia Youtube

Inside Pwn2Own's High-Stakes Industrial Hacking Contest

WIRED Threat Level

At Pwn2Own, hackers had no trouble dismantling systems that help run everything from car washes to nuclear plants—with the prize of taking home the very computers they "pwn.". Security Security / Cyberattacks and Hacks