Tue.Jun 19, 2018

article thumbnail

5 reasons why sharing threat intelligence makes you more cyber secure

IT Governance

With cyber attacks, data breaches and a host of exploits emerging every week, the security landscape is getting almost impossible to navigate. In order to survive, the good guys – organisations, cyber security experts and law enforcement – must work together, sharing threat intelligence and details of successful breaches and defences. Earlier this year, Ponemon Institute polled organisations about threat intelligence sharing, and found the five most commonly cited benefits. 5.

article thumbnail

Resource constraints can spark frugal digital innovation

Information Management Resources

Rather than stifle digital transformation, limited resources can motivate any company ready to think beyond the past, willing to find partners outside traditional vendors, and eager to be agile and creative.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Tips for Integrating Security Best Practices into Your Cloud Strategy

Dark Reading

Do 'cloud-first' strategies create a security-second mindset?

Cloud 61
article thumbnail

Massive CIA Hacking Tool Leak: Ex-Agency Employee Charged

Data Breach Today

Lead Suspect Joshua A. Schulte Already Detained on Child Pornography Charges The U.S. Department of Justice has charged a former CIA officer, 29-year-old Joshua A. Schulte, with providing 8,000 documents that describe the agency's offensive malware tools and practices to WikiLeaks, which published them in 2017 as the "Vault 7" archive.

Archiving 188
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AT&T, Sprint, Verizon to Stop Sharing Customer Location Data With Third Parties

Krebs on Security

In the wake of a scandal involving third-party companies leaking or selling precise, real-time location data on virtually all Americans who own a mobile phone, AT&T , Sprint and Verizon now say they are terminating location data sharing agreements with third parties. At issue are companies known in the wireless industry as “location aggregators,” entities that manage requests for real-time customer location data for a variety of purposes, such as roadside assistance and emergenc

Privacy 160

More Trending

article thumbnail

Perspective Check: Context is Everything in InfoGov

Weissman's World

If you’ve ever used Google to help you find a new infogov technology solution, then you know how every one you find, from every vendor you look at, seems like the answer to all your problems. Here’s how to figure out which one(s) work best in your context! The post Perspective Check: Context is Everything in InfoGov appeared first on Holly Group.

article thumbnail

Analysis: Health Data Breach Tally Trends

Data Breach Today

Hacks, Unauthorized Access/Disclosure and Theft Incidents Top the List About three dozen major health data breaches have been added to the federal tally in recent weeks, including a mix of hacking and unauthorized access/disclosure incidents. Here's an analysis of the latest statistics and the reasons behind the trends.

article thumbnail

Millions of Google, Roku, and Sonos Devices Are Vulnerable to a Web Attack

WIRED Threat Level

Using a technique called DNS rebinding, one amateur hacker found vulnerabilities in devices from Google, Roku, Sonos, and more.

Security 101
article thumbnail

PageUp: No Sign of Data Exfiltration

Data Breach Today

But Old Error Logs Contained Clear Text of Incorrect Passwords Human resources software developer PageUp says it doesn't appear that personal data exposed in a malware attack was actually removed from its systems. But it has also found authentication error logs that recorded incorrect login attempts from before 2007.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Adding MongoDB to the IBM enterprise database ecosystem

IBM Big Data Hub

The modern data landscape demands more than one type of database. That’s IBM has rolled out JSON-document-based databases in Db2 and Cloudant, as well as partnered with select database providers to offer developer-focused database services through the IBM Compose platform.

72
article thumbnail

How to perform a comprehensive vulnerability assessment

IT Governance

Vulnerability assessments are an invaluable way of identifying vulnerabilities in your networks or applications. Penetration testers use them to review target systems and identify potential attack vectors, weaknesses and entry points, while administrators use them to identify previously unknown or unidentified vulnerabilities that may affect their security infrastructure.

Risk 72
article thumbnail

ARMA Houston meeting: How to seamlessly manage information through acquisition and divestitures

TAB OnRecord

The top tips from 40 information management professionals Join Carol Ann Hartnagle, Total Document Solutions and Ian MacPharson, TAB to learn about tips, key steps and challenges that arise throughout an acquisition or divestiture. This fast-paced, interactive presentation includes video interviews from North American industry professionals, live commentary and an interactive Q&A session.

article thumbnail

The Olympic Destroyer Hackers May Have Returned For More

WIRED Threat Level

A recent spate of attacks against biological and chemical threat protection agencies bears the hallmarks of the group hacker group behind Olympic Destroyer.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cisco CPO: Privacy Is Not About Secrecy or Compliance

Dark Reading

Michelle Dennedy sat down with Dark Reading at the recent Cisco Live to set the record straight about privacy, regulation, encryption, and more.

Privacy 76
article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

Every June, Gartner hosts a terrific security conference near Washington, D.C. called Gartner Security & Risk Management Summit. This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders. This year, there were over 3,000 attendees, 120 analyst sessions to choose from, and 200 vendors that were on the show floor and delivering presentations.

Risk 59
article thumbnail

Iran’s Telegram Ban Has Impacted All Corners of the Country

WIRED Threat Level

In Iran, secure messaging app Telegram effectively is the internet. The government has blocked it since April.

article thumbnail

Tesla Employee Steals, Sabotages Company Data

Dark Reading

The electric carmaker is the victim of an "extensive and damaging" insider attack, says CEO Elon Musk.

76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Iowa and Nebraska Enact Information Security Laws

Hunton Privacy

Recently, Iowa and Nebraska enacted information security laws applicable to personal information. Iowa’s law applies to operators of online services directed at and used by students in kindergarten through grade 12, whereas Nebraska’s law applies to all commercial entities doing business in Nebraska who own or license Nebraska residents’ personal information.

article thumbnail

How to Prepare for 'WannaCry 2.0'

Dark Reading

It seems inevitable that a more-powerful follow-up to last year's malware attack will hit sooner or later. You'd better get prepared.

IT 61
article thumbnail

Announcing OpenText Security Services

OpenText Information Management

According to a recent study from ISACA released at RSA, 59% of organizations have open security positions. This cybersecurity skills gap leaves organizations at risk. Over 80% of respondents to the same survey indicated that their enterprise is likely or very likely to experience a cyber attack this year – 50% already had during the … The post Announcing OpenText Security Services appeared first on OpenText Blogs.

article thumbnail

'Olympic Destroyer' Reappears in Attacks on Europe, Russia

Dark Reading

The attack group known for targeting the 2018 Winter Olympics has resurfaced in campaigns against European financial and biochem companies.

53
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Break boundaries and redefine normal at the OpenText Women in Technology Summit

OpenText Information Management

The technology industry has been built on innovation, vision and breaking the norms. From the birth of the Internet to the rise of Artificial Intelligence and the Internet of Things, we’ve seen the tremendous impact that technological innovation can have on the world. But innovation doesn’t just happen. It’s the product of creativity, experience, and … The post Break boundaries and redefine normal at the OpenText Women in Technology Summit appeared first on OpenText Blogs.

article thumbnail

Virginia Amends Breach Notification Law Applicable to Income Tax Information

Hunton Privacy

On July 1, 2018, HB 183 , which amends Virginia’s breach notification law, will come into effect (the “amended law”). The amended law will require income tax return preparers who prepare individual Virginia income tax returns to notify the state’s Department of Taxation (the “Department”) if they discover or are notified of a breach of “return information.

article thumbnail

Olympic Destroyer Returns to Target Biochemical Labs

Threatpost

The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure.

45
article thumbnail

Most Websites and Web Apps No Match for Attack Barrage

Dark Reading

The average website is attacked 50 times per day, with small businesses especially vulnerable.

58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

APT15 Pokes Its Head Out With Upgraded MirageFox RAT

Threatpost

This is the first evidence of the China-linked threat actor's activity since hacked the U.K. government and military in 2017 (which wasn't made public until 2018).

article thumbnail

Securing the connected supply chain takes center stage at OpenText Enterprise World 2018

OpenText Information Management

Information security sits at the top of the agenda for almost every CIO but its role has subtly changed. Sure, we want to make sure nothing bad happens to our data or network. That will always be vitally important. However, in our new collaborative world, we now look for security to be a business enabler. … The post Securing the connected supply chain takes center stage at OpenText Enterprise World 2018 appeared first on OpenText Blogs.

article thumbnail

Security Analytics Startup Uptycs Raises $10M in Series A

Dark Reading

This round of funding for Uptycs, which runs an osquery-powered analytics platform, was led by ForgePoint Capital and Comcast Ventures.