Fri.Mar 23, 2018

article thumbnail

Atlanta Ransomware Attack Freezes City Business

Data Breach Today

Damage Assessment Is Underway, But Backups Are in Place, Officials Say Ransomware has struck the city of Atlanta and frozen internal and customer-facing applications, hampering residents from paying bills or accessing court information. But the city says it has working backups and expects to pay employees on time.

article thumbnail

The Facebook scandal isn’t just about privacy. Your economic future is on the line | James Ball

The Guardian Data Protection

If data is the new oil, the wells are in the hands of a few billionaires, and we need to ask how to take back the wealth Whenever a technological revolution brings upheaval to the world, it initially benefits the small number of people at its forefront to the detriment of others. When the industrial revolution brought about the birth of mass production, it led to thousands of skilled, independent workers losing their trades and much of their livelihoods, facing either unemployment or less-skille

Privacy 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Alleged HIV Breach Leads to Suit Against CVS, Mailing Vendor

Data Breach Today

Complaint Also Alleges CVS Failed to Notify HHS of the Mailing Incident A class action lawsuit is seeking millions of dollars in damages for plaintiffs after yet another mailing-related health data breach involving sensitive HIV-related information allegedly visible through envelope windows.

article thumbnail

DOJ Indicts 9 Iranians For Brazen University Cyberattacks

WIRED Threat Level

A new indictment asserts a long string of attacks against hundreds of universities and private companies, in which Iran pilfered more than $3 billion worth of intellectual property.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

9 Iranians Indicted for Massive Hacking Scheme

Data Breach Today

Thousands of Professors Worldwide Among Allegedly Those Targeted The U.S. Department of Justice has announced the indictment of nine Iranians alleged to have penetrated systems belonging to hundreds of U.S. and foreign universities, government entities and private companies to steal more than 31 terabytes of documents and data.

More Trending

article thumbnail

Lawmakers Tell Facebook's Zuckerberg: You Will Testify

Data Breach Today

As the Cambridge Analytica scandal continues to unfold, Congress seeks answers from Facebook, calling on CEO Mark Zuckerberg to testify. Also in the latest edition of the ISMG Security Report: Is it possible to build a secure digital wallet for storing cryptocurrency?

Security 100
article thumbnail

Everyone Knows How to Secure Elections. So Do It

WIRED Threat Level

With $380 million in the spending bill earmarked for securing digital elections, the time for talk is over.

article thumbnail

Cyber attacks: What to prepare for

IT Governance

There was a 25% increase in the number of reported data breaches in 2017, according to the European Union Agency for Network and Information Security (ENISA) Threat Landscape Report 2017. 2018 could be even worse, with the report warning about the growing threat of: SQL injection , in which attackers insert malicious code into web applications. This allows them to spoof people’s identity, tamper with existing data, void transactions, change balances, become administrators of the database server

article thumbnail

Turning disruption into transformation

OpenText Information Management

Whether digital – such as Industry 4.0 – or geo-political – such as Brexit – disruption is everywhere for UK manufacturers. In a sector traditionally slow to react, this can be a major challenge. You have to create a lean and agile organization capable of responding to changing market conditions and customer expectations. How best … The post Turning disruption into transformation appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How ITIL can help your cyber security career

IT Governance

Whether you’ve always wanted to work in IT service management (ITSM) or are just looking for a secure and well-paid career, you should know about ITIL ® (the Information Technology Infrastructure Library). It’s the most widely adopted ITSM framework in the world, being used by both small organisations and multinationals, such as Shell, HP, NASA, Microsoft and the MoD.

article thumbnail

South Dakota Enacts Breach Notification Law

Hunton Privacy

As reported in BNA Privacy Law Watch , on March 21, 2018, South Dakota enacted the state’s first data breach notification law. The law will take effect on July 1, 2018, and includes several key provisions: Definitions of Personal Information and Protected Information. The law defines personal information as a person’s first name or first initial and last name in combination with any one or more of the following data elements: (1) Social Security Number; (2) driver’s license number or other uniq

article thumbnail

How artificial intelligence is driving digital transformation

Information Management Resources

In their new book, 'Human+Machine: Reimaging Work in the Age of AI,' authors Paul Daugherty and H. James Wilson look at the impact of AI on business processes. Here is an excerpt.

article thumbnail

GreyKey iPhone Unlocker

Schneier on Security

Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know whether sales are limited to US law enforcement, or if it is also selling in other parts of the world. Regardless of that, it's highly likely that these devices will ultimately end up in the hands of agents of an oppressive regime, whether directly from Grayshift or indirectly through the black market.

Sales 50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Frequently Asked Questions about the Certificate of Federal Records Management Training 

National Archives Records Express

Why should I get NARA’s Certificate of Federal Records Management Training? NARA’s program gives Federal records management professionals a set of benchmarks to gauge their professional development. Information contained in the courses associated with the Certificate cover every aspect of Federal Records Management and are an important step in acquiring the skills necessary to manage Federal records.

article thumbnail

Ransomware Attack Cripples Several Atlanta City Systems

Threatpost

The city of Atlanta is being extorted for $51,000 in a ransomware attack that occurred early Thursday that impacted several local government departments.

article thumbnail

Zeynep Tufekci on Facebook and Cambridge Analytica

Schneier on Security

Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book manuscript is due on Monday (finally!), and 2) I knew Zeynep would say what I would say, only better.

Privacy 48
article thumbnail

Mastering the critical steps to being a data-driven organization

Information Management Resources

To succeed at digital transformation, firms need to embark on a journey from being a 'data collector' to 'data aware' to 'data-driven' in a timely and strategic fashion.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Financial Stability Board to Develop International Cybersecurity Lexicon

Hunton Privacy

On March 20, 2018, the Financial Stability Board (“FSB”) delivered a note to finance ministers and central bank governors from the world’s top 20 economic powers, known as the G-20. The note provides a progress update on the FSB’s work to develop a common vocabulary of cyber terms. . The FSB is developing the cyber lexicon to address cybersecurity and cyber resilience in the financial sector and hopes that it will boost cross-border cooperation on cybersecurity.

article thumbnail

Senate Gives Nod To Controversial Cross-Border Data Access Bill

Threatpost

The senate on Thursday gave the thumbs up to a bill that is the subject of both support by tech companies and critique by privacy groups.

Access 52
article thumbnail

Looking Back and Thinking Ahead on Cyberwar, Nation-State Attacks

Dark Reading

In the domain of cyber warfare, the effective strategies for fighting yesterday's cyberattacks will not work against tomorrow's, experts said.

49
article thumbnail

How to Calculate How Many Boxes You Have to Store

Record Nations

If you’re taking the step to utilizing the many benefits of a records storage service, first you’ll need to calculate the amount of documents you need stored. By figuring out the volume of documents you need stored, you can get a decent estimation of how much your storage project will cost. We’ve seen papers stored […]. The post How to Calculate How Many Boxes You Have to Store appeared first on Record Nations.

Paper 41
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Looking Back to Look Ahead: Cyber Threat Trends to Watch

Dark Reading

Data from the fourth quarter of last year shows the state of application exploits, malicious software, and botnets.

53
article thumbnail

A Closer Look at APT Group Sofacy’s Latest Targets

Threatpost

Threatpost talks to Kaspersky Lab researcher Kurt Baumgartner who was instrumental in tracking the latest activities of the Russian-speaking Sofacy APT gang.

article thumbnail

Survey Says…Cybersecurity Remains A Critical Challenge For Business

Privacy and Cybersecurity Law

On March 14, 2018, IBM Security announced the results of a new global study on organizational cybersecurity readiness and resiliency entitled “The […].

article thumbnail

City of Atlanta Hit with Ransomware Attack

Dark Reading

FBI investigating computer outages in the city's network possibly tied to Samsam-type ransomware variant.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Deloitte hires Europol chief to help lead booming cyber business

Information Management Resources

The firm is planning to add 500 people to its European cybersecurity practice to meet the growing demand from corporate clients anxious to prevent hacks.

article thumbnail

DoJ Indicts 9 Iranians for Hacking into Hundreds of Universities, FERC, Dept. of Labor, Others

Dark Reading

Suspects were operating on behalf of Iranian government and the Iranian Revolutionary Guard, US officials said.

article thumbnail

Biometrics has growing, but not sole, role in authentification security

Information Management Resources

Fingerprint and face scanners are the most common types of biometric authentication used on corporate devices and services.