Thu.Jul 19, 2018

article thumbnail

6 Ways to Tell an Insider Has Gone Rogue

Dark Reading

Malicious activity by trusted users can be very hard to catch, so look for these red flags.

73
article thumbnail

The use of fax machines in the NHS branded “ludicrous”

IT Governance

The RCS (Royal College of Surgeons) has revealed that more than 8,000 fax machines are still owned by NHS hospital trusts in England. In a press release , the chair of the RCS’s Commission on the Future of Surgery, Richard Kerr, criticised the NHS’s continued reliance on the “archaic” technology. He said that, although the health service is increasingly investing in artificial intelligence and imagining in patient care, “NHS hospital trusts remain stubbornly attached to using archaic fax machine

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Greece Will Send Russian Cybercrime Suspect to France

Data Breach Today

US Accuses Alexander Vinnik of $4 Billion in Bitcoin Money Laundering A Greek court has ruled that Russian national Alexander Vinnik will be sent to France to face cybercrime charges. The U.S. has accused Vinnik of laundering $4 billion in bitcoins via the BTC-e exchange, which it said also handled stolen Mt. Gox and Silk Road bitcoins.

IT 140
article thumbnail

There is no social license for My Health Record. Australians should reject it | Julia Powles

The Guardian Data Protection

The Australian Digital Health Agency’s bullish approach to My Health Record shows it learned no lessons from the UK’s disastrous version A three-month countdown clock alerted many Australians this week to the government’s progress on a massive, mandatory health data centralisation scheme. Known as My Health Record , the scheme compulsorily enlists all Australians into sharing their health information, unless they opt out before the deadline of 15 October 2018.

IT 75
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A New Effort to Draft Medical Device Cybersecurity Guidance

Data Breach Today

An advisory group that includes a diverse array of members will spend the coming months devising detailed guidance on how to address the "shared responsibility" of medical device cybersecurity, explains Greg Garcia, who is leading the initiative.

More Trending

article thumbnail

Protect Your Business With an Endpoint Management Solution

Data Breach Today

Protect Your Business With an Endpoint Management Solution As organizations are seeing higher numbers of people working remotely, including parts of their IT team, the need for stronger endpoint management is even more important. Automating routine tasks can also be great for business as it drives key business growth by increasing productivity through the automation of of manual processes while optimizing resource allocation and reducing IT costs.

IT 100
article thumbnail

Weekly podcast: the IICSA, the EU-US Privacy Shield, data breach costs and Lotto hackers

IT Governance

This week, we discuss a £200,000 fine for the IICSA, a move to suspend the EU-US Privacy Shield, how much a data breach might cost your organisation, and the sentencing of two National Lottery hackers. Hello and welcome to the IT Governance podcast for Friday, 20 July. Here are this week’s stories. The ICO (Information Commissioner’s Office) has fined the IICSA (Independent Inquiry into Child Sexual Abuse) £200,000 for sending a bulk email that identified possible victims of historic sexual abus

article thumbnail

Robocalling Firm Leaves Virginia Voter Data Online

Data Breach Today

Unsecured Amazon S3 Bucket to Blame RoboCent, a company that specializes in robocalling voters, left nearly 3,000 files containing detailed data about Virginia voters online by mistake. The data has been secured, but the incident points again to ongoing problems of security misconfigurations in repositories and lack of end-to-end encryption.

article thumbnail

Why you need an ISACA qualification

IT Governance

If you want to be taken seriously as an IT auditor, you’ll need an ISACA ® qualification. The independent organisation’s certification scheme is the most well-respected in the industry, and those with an ISACA qualification can demonstrate that they are among the IT governance elite. ISACA offers several qualifications for IT professionals. We’ve listed three of the most common, along with key information.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Stealthy Malware Hidden in Images Takes to GoogleUserContent

Threatpost

Hackers are embedding malicious code within compromised, uploaded images on trusted Google sites – weaponizing the website and staying under the radar.

article thumbnail

The Fundamental Flaw in Security Awareness Programs

Dark Reading

It's a ridiculous business decision to rely on the discretion of a minimally trained user to thwart a highly skilled sociopath, financially motivated criminal, or nation-state.

article thumbnail

How to choose the best EDI software and services for your supply chain in 2018

OpenText Information Management

Digital transformation is a hot topic in every part of business, especially the supply chain. Recent research from IDC and OpenText™ found that over 40% of supply chain organizations are either advanced or very advanced in their digital transformation initiatives. Electronic Data Interchange (EDI) can be considered the supply chain’s first great disruptive digital technology.

article thumbnail

Top 10 Reasons to Scan Your Records

Record Nations

As technology continues to improve, going paperless is becoming more and more common—and in some cases like healthcare it’s now standard. From saving money in both the long and short-term, to increasing productivity and security right from the get-go, there are numerous reasons to scan your records. In this video learn more about the top […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cisco fixes critical and high severity flaws in Policy Suite and SD-WAN products

Security Affairs

Cisco has found over a dozen critical and high severity vulnerabilities in its Policy Suite, SD-WAN, WebEx and Nexus products. The tech giant has reported customers four critical vulnerabilities affecting the Policy Suite. The flaws tracked as CVE-2018-0374 , CVE-2018-0375 , CVE-2018-0376, and CVE-2018-0377 have been discovered during internal testing.

article thumbnail

12 top emerging technologies that will impact organizations

Information Management Resources

Edge computing, deep learning, computer vision and natural language generation are a few of the tech areas companies will most embrace.

article thumbnail

Thousands of Mega account credentials leaked online, it is credential stuffing

Security Affairs

Thousands of account credentials associated with the popular file storage service Mega have been published online, The former NSA hacker Patrick Wardle, co-founder at Digita Security , discovered in June a text file containing over 15,500 usernames, passwords, and files names. Found file on VirusTotal w/ 15K+ Mega accounts (user names/passwords & users' file listings).

IT 50
article thumbnail

How Cyber Insurance Changes the Conversation Around Risk

Threatpost

In this InfoSec Insider cyber insurance expert Nick Sanna discusses how to balance threat exposures and protecting assets with insurance against hacking, breaches and vulnerabilities.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

‘IT system issue’ caused cancellation of British Airways cancelled flights at Heathrow

Security Affairs

British Airways canceled flights at Heathrow due to an ‘IT system issue,’ the incident occurred on Wednesday and affected thousands of passengers. The problem had severe repercussions on the air traffic, many passengers also had their flights delayed. “On one of the busiest days of the summer, British Airways cancelled dozens of flights to and from Heathrow, affecting at least 7,000 passengers.

IT 48
article thumbnail

Enabling instant insight and decision support with stream processing

IBM Big Data Hub

Sharpe Engineering helps clients understand and utilize data in motion with stream processing and machine learning technologies that make sense of previously underutilized data.

44
article thumbnail

Critical Authentication Flaws in Cisco Policy Suite Patched

Threatpost

Cisco also pushed out seven high-severity fixes for its SD-WAN solution for business users, and a patch for a DoS flaw in the Cisco Nexus 9000 Series Fabric Switches.

article thumbnail

70 US Election Jurisdictions Adopt Free Website Security Service

Dark Reading

Hawaii, Idaho, North Carolina, and Rhode Island are among states now using gratis DDoS mitigation, firewall, and user access control service from Cloudflare.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

GangWang GPS Navigation Attack Leads Unsuspecting Drivers Astray

Threatpost

In a stalking or random criminal scenario, the ability to guide someone to an out-of-the-way, isolated location could be a precursor to kidnapping or worse.

IoT 44
article thumbnail

A Review: Infonomics

IG Guru

Infonomics, by Douglas B. Laney at Gartner, Inc. is a book on how to monetize, manager, and measure information as an asset for competitive advantage. Simply put, using your data to get ahead. Infonomics is a necessary read for anyone who creates or captures information in his or her business. Now that we have ruled […]. The post A Review: Infonomics appeared first on IG Guru.

article thumbnail

Beyond Passwords: Why Your Company Should Rethink Authentication

Dark Reading

Scaling security infrastructure requires scaling trust of users, devices, and methods of authentication. Here's how to get started.

article thumbnail

The Information Governance Conference Announces 2018 Keynote Speaker

IG Guru

Drones and related technologies continue to tangle up courtrooms – with implications on downstream information, autonomous vehicles, manufacturing, healthcare, and so much more. That’s why we’re so very pleased to announce our first Keynote Speaker of the main #InfoGov18 Conference – Kathryn Rattigan. Ms. Rattigan is a Business Litigation, Data Privacy, and Cybersecurity attorney at Robinson+Cole with specialization […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

Threatpost

This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency.

Privacy 42
article thumbnail

Is the federal government ready for robotic process automation?

CGI

Is the federal government ready for robotic process automation? harini.kottees…. Thu, 07/19/2018 - 04:38. Robotic process automation (RPA) has come into its own, and many organizations are gaining efficiencies by automating repetitive, rules-based tasks. Don’t think of the shambling, clanking humanoid automatons from 1950s sci-fi, or even the sleek bomb-disposal robots used today by the military and police departments.

article thumbnail

Two Sets of Eyes, Part 3: Why Pair Programming works (despite the objections)

Role Model Software

Last time, we talked about the different flavors of two sets of eyes. They exist on a continuum that we see as: maximizing communication efficiency; maximizing code design quality; and minimizing rework. The last two options on that continuum are flavors of pair programming (or “pairing” for short): Pair program with another person only at certain points while writing the code (opportunistic pairing).