Wed.Mar 07, 2018

article thumbnail

166 Applebee's Restaurants Hit With Payment Card Malware

Data Breach Today

Payment Card Data Stolen by Malware-Wielding Attackers, Franchisee Warns Anyone who dined out at one of 166 Applebee's restaurants in 15 states may have had their payment card details compromised by point-of-sale malware infections that began in November 2017, RMH Franchise Holdings warns.

Sales 189
article thumbnail

Leaked NSA Tool 'Territorial Dispute' Reveals the Agency's List of Enemy Hackers

WIRED Threat Level

A leaked NSA tool offers a glimpse into what the NSA knows about the hacking operations of adversaries—some of which may still be secretly ongoing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pennsylvania Sues Uber Over Late Breach Notification

Data Breach Today

State Could Seek As Much as $13.5 Million in Civil Penalties The attorney general of Pennsylvania has filed a lawsuit against Uber for allegedly violating the state's mandatory breach notification law. It's the latest in a long string of legal and regulatory repercussions Uber is facing after waiting more than a year to disclose a serious breach.

IT 176
article thumbnail

Press for Progress

OpenText Information Management

Today, as the world celebrates and reflects on the achievements of women, OpenText continues the important conversation to promote and support women in technology with our participation in International Women’s Day 2018. We maintain the unequivocal belief that gender equality is critical to the success of OpenText, the technology industry, and that it contributes to … The post Press for Progress appeared first on OpenText Blogs.

IT 81
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Putin Offers Extradition Promise to US: 'Never'

Data Breach Today

Russian Information Warfare Operations Continue Unabated; What Can Be Done? Russian President Vladimir Putin has issued an unequivocal promise about the extradition potential for 13 Russian nationals accused of working for a Kremlin-backed troll factory: "Never." It's unclear how the U.S. might best battle Russia's influence operations.

IT 150

More Trending

article thumbnail

ID and Access Management: The Next Steps

Data Breach Today

Bringing identity and access management to the next level and investigating the potential that blockchain offers to improve the management of device IDs are among the priority security projects at Sentara Healthcare, an integrated delivery system serving Virginia and North Carolina, says CISO Daniel Bowden.

Access 111
article thumbnail

How Leaked NSA Spy Tool 'EternalBlue' Became a Hacker Favorite

WIRED Threat Level

EternalBlue leaked to the public nearly a year ago. It's wreaked havoc ever since.

IT 109
article thumbnail

ONC Considering Tweaks to Trusted Exchange Framework

Data Breach Today

Based on the feedback it received, the Office of the National Coordinator for Health IT will consider making tweaks to its proposed Trusted Exchange Framework and Common Agreement, including provisions related to privacy and security, says ONC's Genevieve Morris.

Privacy 100
article thumbnail

Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

On March 7, 2018, the U.S. Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). The bill is considered a critical piece of legislation that many expect will need to pass before the Congressional recess in August 2018.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Free green paper: essential compliance guidance for the NIS Directive

IT Governance

The Directive on security of network and information systems (NIS Directive) must be transposed into national law by May 2018. The Directive requires operators of essential services (OES) and digital service providers (DSPs) to implement effective security measures appropriate to associated risks, as well as measures to minimise the impact of incidents and ensure business continuity.

Paper 68
article thumbnail

Introducing the OpenText B2B Managed Services For Dummies guide

OpenText Information Management

Firstly a bit of background about the OpenText™ B2B Managed Services For Dummies Guide, starting with my first For Dummies Guide project, relating to supply chain analytics, published over a year ago. The first guide provided a high-level overview of how analytics could be leveraged across today’s supply chains and how it could provide meaningful … The post Introducing the OpenText B2B Managed Services For Dummies guide appeared first on OpenText Blogs.

B2B 58
article thumbnail

New DDoS Reflection-Attack Variant

Schneier on Security

This is worrisome: DDoS vandals have long intensified their attacks by sending a small number of specially designed data packets to publicly available services. The services then unwittingly respond by sending a much larger number of unwanted packets to a target. The best known vectors for these DDoS amplification attacks are poorly secured domain name system resolution servers , which magnify volumes by as much as 50 fold, and network time protocol , which increases volumes by about 58 times.

article thumbnail

5 Key Components to a Records Management Program

Record Nations

A solid records management program is critical in keeping your company’s files organized, accessible, and secure. Properly managing your records includes following the life of the file from the moment they are created to the the point of disposition. Records Management Program: The Key Components Identify your qualified employees that will handle the planning […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Privilege Abuse Attacks: 4 Common Scenarios

Dark Reading

It doesn't matter if the threat comes from a disgruntled ex-employee or an insider anticipating financial gain, privilege abuse patterns are pretty much the same, and they're easy to avoid.

IT 49
article thumbnail

Why artificial intelligence dominates analyst predictions

Information Management Resources

The drivers are disruptive market and technology forces that are reshaping everyone’s business environment and everyone’s concept of 'customer' and 'service.'.

article thumbnail

Why Security-Driven Companies Are More Successful

Dark Reading

Software Security Masters are better at handling application development security and show much higher growth than their peers. Here's how to become one.

article thumbnail

Uber as a HIPAA business associate

Data Protection Report

Uber recently announced the launch of Uber Health , a non-emergency ride service that allows healthcare providers to schedule and pay for transportation for their patients. The stated purpose of the service is to expand medical transportation to traditionally underserved areas. Roughly 3.6 million Americans miss medical appointments each year due to lack of reliable transportation , contributing to the roughly $150 billion per year the healthcare industry loses due to missed appointments. .

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Intel SGX Can Be Used to Hide, Execute Malware

Dark Reading

The microprocessor giant's Software Guard Extensions security feature can be abused to implement virtually undetectable malware, Graz University researchers say.

article thumbnail

UK: New Data Protection Fee

DLA Piper Privacy Matters

The United Kingdom has announced plans to introduce a new “Data Protection Fee” to replace the current system of registration for data controllers. Draft Regulations [1] were laid before Parliament on 20 February 2018 and the Information Commissioner’s Office (“ICO”), the independent supervisory authority set up to promote and oversee compliance with data protection legislation in the UK, has now produced accompanying guidance. [2].

GDPR 40
article thumbnail

KACE Systems Management Appliance: Patch Management Overview and Analysis

eSecurity Planet

We review the KACE Systems Management Appliance, a patch and endpoint management solution that can patch 20,000 machines in four hours.

45
article thumbnail

Memcached DDoS Attack: Kill Switch, New Details Disclosed

Dark Reading

Corero shares a kill switch for the Memcached vulnerability and reports the flaw is more extensive than originally believed.

46
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ALSP – Not Just Your Daddy’s LPO: eDiscovery Trends

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom also wrote a terrific four part informational overview on Europe’s General Data Protection Regulation (GDPR) titled eDiscovery and the GDPR: Ready or Not, Here it Comes (and participated with me on a webcast on the same topic) and wrote another te

GDPR 38
article thumbnail

Researchers Defeat Android OEMs' Security Mitigations

Dark Reading

At Black Hat Asia, two security experts will bypass security improvements added to Android by equipment manufacturers.

article thumbnail

What’s in your data and analytics strategy?

Information Management Resources

We have written a number of research pieces on strategy; and we have analyzed many client produced documents. From them, here are thoughts on things organizations should be doing.

article thumbnail

Cybersecurity Gets Added to the M&A Lexicon

Dark Reading

Threat intelligence data can give a clear picture of an acquisition target that could make or break a deal.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Late-comer to GDPR compliance? Look to your data first

Information Management Resources

Even if you’re going to be late to the party - and Forrester says 80 percent of organizations will be - doing certain things to become compliant can help your business beyond avoiding fines.

article thumbnail

Group-IB Helps Suspend Ukrainian DDoS Attack Group

Dark Reading

This case marks the first successful prosecution of cybercriminals in Ukraine, the organization reports.

44
article thumbnail

More organizations moving toward a shared view of managing cyber risks

Information Management Resources

A majority of key technology stakeholders recently surveyed agree on the importance of cross-functional collaboration and the value of establishing common control processes.

Risk 30