Tue.Mar 06, 2018

article thumbnail

Ukraine Sentences Two Citizens for DDoS Extortion Campaigns

Data Breach Today

Groundbreaking Prosecution Targeted Attackers Who Demanded Bitcoin Payoffs In a groundbreaking prosecution, two individuals in Ukraine have been sentenced for running extortion campaigns that disrupted international victims' websites with massive DDoS attacks unless they paid bitcoin ransoms of up to $10,000.

192
192
article thumbnail

A Winning Recipe -- Cloud + SaaS + IaaS (new eBook)

AIIM

A new eBook that might be of interest. A winning recipe: SaaS + Cloud Content Management + IaaS. Processes, Content Management and Infrastructure. Every cloud application rests upon a platform, whether it be a “public” one like Azure or IBM’s platform or Google’s or Amazon Web Services or a private one specific to the application vendor. And that means that customers focused on application choices must also make sure that their underlying IaaS platform meets world-class standards of privacy, com

Cloud 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

167 Applebee's Restaurants Hit With Payment Card Malware

Data Breach Today

Payment Card Data Stolen by Malware-Wielding Attackers, Franchisee Warns Anyone who dined out at one of 167 Applebee's restaurants located across 15 different states may have had their payment card details compromised by point-of-sale malware infections that began in November 2017, RMH Franchise Holdings warns.

Sales 178
article thumbnail

2018 Global Data Regulations & Compliance Heat Up – Are you Ready?

Thales Cloud Protection & Licensing

Every year, new regulations and compliance orders come into play that impact businesses across the world. This year, the major regulation that will be implemented, is the European Union’s General Data Protection Regulation (GDPR) , which takes effect on May 25, 2018. GDPR enables consumers to view, limit and control how companies collect and process their personal data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'No Slowdown' for HIPAA Enforcement, But Audits Ending

Data Breach Today

OCR Director Roger Severino Offers Update at HIMSS18 Conference HHS Office for Civil Rights Director Roger Severino told an audience at the HIMSS18 conference Tuesday that there will be "no slowdown" in the agency's HIPAA enforcement efforts. But he told ISMG following the presentation that there will be no phase 3 for HIPAA compliance audits.

More Trending

article thumbnail

Preparing an Omnichannel Anti-Fraud Strategy

Data Breach Today

Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud.

Risk 124
article thumbnail

Ashu Thangaraj talks tech, careers and diversity in the workplace

OpenText Information Management

Meet Ashu Thangaraj, director of Engineering from Bangalore, India. In this post, Ashu shares her experience working as a leader in the tech industry and talks about her ever-growing passion for diversity in the workplace. Tell us a little bit about yourself. What is your role here at OpenText? I am Ashu Thangaraj, and I … The post Ashu Thangaraj talks tech, careers and diversity in the workplace appeared first on OpenText Blogs.

75
article thumbnail

Getting Cloud Security Right

Data Breach Today

When working with cloud service providers, healthcare organizations must take responsibility for security practices rather than relying on the vendor, says Sonia Arista, a security consultant who formerly was CISO at Tufts Medical Center. She's a featured speaker at the HIMSS18 conference.

Cloud 111
article thumbnail

Start your Cyber Essentials Plus journey as recommended for health and social care

IT Governance

Cyber Essentials is a world-leading, cost-effective assurance mechanism for companies of all sizes. The scheme provides five security controls (secure configuration, firewalls, access controls, patch management, malware protection) that, according to the UK government, could prevent most common cyber attacks. Recent reviews have recommended Cyber Essentials Plus as the minimum standard for healthcare providers and partners to demonstrate that they have implemented the most basic cyber security c

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Keeping Up With the Evolving Threat Landscape

Data Breach Today

To keep up with the ever-evolving cyberthreat landscape, healthcare organizations must combine basic security principles with advanced technologies, Kristopher Kusche, CISO at Albany Medical Center, says in an interview at the HIMSS18 conference.

Security 100
article thumbnail

Local authorities faced 98 million cyber attacks in the past 5 years

IT Governance

The government is a well-known target for cyber criminals, but according to a new report, the problem is more significant than many people thought. Big Brother Watch’s Cyber-attacks in local authorities found that UK councils faced 98 million cyber attacks between 2013 and 2017, and a quarter of incidents led to data breaches. This equates to 24.5 million successful cyber attacks and, in all likelihood, hundreds of millions of citizens’ data records being exposed.

article thumbnail

Security Vulnerabilities in Smart Contracts

Schneier on Security

Interesting research: " Finding The Greedy, Prodigal, and Suicidal Contracts at Scale ": Abstract: Smart contracts -- stateful executable objects hosted on blockchains like Ethereum -- carry billions of dollars worth of coins and cannot be updated once deployed. We present a new systematic characterization of a class of trace vulnerabilities , which result from analyzing multiple invocations of a contract over its lifetime.

article thumbnail

FTC Recommends Steps to Improve Mobile Device Security Update Practices

Hunton Privacy

On February 28, 2018, the Federal Trade Commission issued a report, titled Mobile Security Updates: Understanding the Issues (the “Report”), that analyzes the process by which mobile devices sold in the U.S. receive security updates and provides recommendations for improvement. The Report is based on information the FTC obtained from eight mobile device manufacturers, and from information the Federal Communications Commission collected from six wireless carriers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IRS Warns About New Cyber Scam Targeting Taxpayers

Privacy and Cybersecurity Law

Last month, the United States (US) Internal Revenue Service (IRS) issued a warning to US taxpayers that cyber criminals are increasing their […].

article thumbnail

Design Weakness in Microsoft CFG Allows Complete Bypass

Dark Reading

Researchers from Italy's University of Padua will demo a new technique to evade Control Flow Guard, the widely deployed security mechanism, at Black Hat Asia.

article thumbnail

POS Malware Found at 160 Applebee’s Restaurant Locations

Threatpost

Malware found on POS systems at Applebee's restaurants potentially stole customer credit card information.

Sales 64
article thumbnail

Pragmatic Security: 20 Signs You Are 'Boiling the Ocean'

Dark Reading

Ocean-boiling is responsible for most of the draconian, nonproductive security policies I've witnessed over the course of my career. Here's why they don't work.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Leading Global Systems Integrator delaware Brings Deep SAP and Microsoft Expertise to the M-Files Partner Program

Info Source

DALLAS, March 6, 2018 : M-Files Corporation , the intelligent information management company, today announced that delaware , a systems integrator with a large global presence and strong experience with SAP and Microsoft solutions, is the latest organization to join its worldwide Partner Program. delaware has more than 1,800 professionals in 27 regional offices located across 14 countries.

ECM 40
article thumbnail

Please Vote for Hunton: Nominated for 2018 Cyber Law Firm of the Year

Hunton Privacy

Hunton & Williams LLP is honored to be nominated for Advisen’s 2018 Cyber Risk Awards in the category of Cyber Law Firm of the Year. Advisen is an industry leader in insurance consulting, and regularly hosts conferences offering insights and innovation on cyber risk. The winners are determined by online ballot and the awards will be presented in New York City on June 6, 2018.

article thumbnail

Alaris S2000 Series Scanners Win Editor’s Choice Award from Better Buys

Info Source

March 6, 2018 – Rochester, NY – Better Buys, a trusted authority for delivering unbiased, expert insights on the software and technology that businesses rely on, announced that Alaris, a Kodak Alaris business, has received the Editor’s Choice Award for Q1 2018 in the document scanners category. In recognizing the Alaris S2000 Series Scanners, Better Buys cited several key differentiators that help businesses efficiently capture and manage information.

article thumbnail

Nearly half of CIOs now plan to deploy artificial intelligence

Information Management Resources

While there has been a great deal of hype around the technologies that make up AI, that will change to action this year according to Gartner analysts.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Identity Management: Where It Stands, Where It's Going

Dark Reading

How companies are changing the approach to identity management as people become increasingly digital.

IT 52
article thumbnail

IoT Security Disconnect: As Attacks Spike, Device Patching Still Lags

Threatpost

More than half of businesses have faced IoT-related attacks, yet only a third consider IoT cyber security “very important.”.

IoT 46
article thumbnail

GDPR violations – Hefty fines or broken reputations; which is worse?

Information Management Resources

In addition to experiencing a major fine, violators will be subjected to regular periodic data protection audits which will shine a continuing regulatory spotlight on compliance trouble spots.

GDPR 37
article thumbnail

Google Patches 11 Critical Bugs in March Android Security Bulletin

Threatpost

Google is warning a critical vulnerability found in its Media Framework warrants extra attention by security minded Android users.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Second Ransomware Round Hits Colorado DOT

Dark Reading

A variant of SamSam sends CDOT employees back to pen and paper with two attack waves in two weeks.

article thumbnail

Most firms still unprepared for fast-approaching GDPR mandates

Information Management Resources

A new survey by research firm EY finds that only 33 percent of respondents have a plan in place to comply with the European Union legislation, says Andrew Gordon.

GDPR 36
article thumbnail

Houstonians, Here’s a Terrific Panel Discussion on TAR Right in Your Own Backyard: eDiscovery Best Practices

eDiscovery Daily

Next month, I have the privilege of moderating a panel on the current state of the acceptance of technology assisted review (TAR) with three terrific panelists, courtesy of the Association of Certified E-Discovery Specialists (ACEDS). If you’re in Houston on April 3rd, you might want to check it out! The panel is titled From Asking About It to Asking For It: The Evolution of the Acceptance and Use of TAR and it will be held at the offices of BoyarMiller law firm at 2925 Richmond Avenue, Houston