Thu.Feb 22, 2018

article thumbnail

Anatomy of a Russian Information Warfare Campaign

Data Breach Today

Cost of Troll Farm: $15 Million. Impact: Priceless Want to meddle with a democracy? Just use its social media outlets against it to amplify already existing social divisions. That's the quick take on the indictment recently unsealed by Special Counsel Robert Mueller that accuses Russians of running an "active measures" campaign against the United States.

IT 184
article thumbnail

Digital Preservation -- High Stakes for Finance and Insurance Companies

AIIM

It is time to think about Digital Preservation differently — as a dedicated capability that keeps long-term information alive and usable and trusted and easily found. The time to act is now. AIIM believes that digital preservation needs to be viewed through the prism of a set of Intelligent Information Management capabilities that are integral to delivering upon the Digital Transformation challenge of understanding, anticipating, and redefining internal and external customer experiences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mitigating the Insider Threat: Lessons From PNB Fraud Case

Data Breach Today

After PNB Incident, Security Practitioners Discuss Technologies to Mitigate Risks Now that it's been confirmed that an insider at Punjab National Bank paved the way for $1.8 billion in fraudulent transactions, the Reserve Bank of India is reiterating the need to strengthen security measures tied to SWIFT interbank transactions, and security experts are offering risk mitigation advice.

Risk 150
article thumbnail

US Border Patrol Hasn’t Validated E-Passport Data For Years

WIRED Threat Level

For over a decade, US Customs and Border Patrol has been unable to verify the cryptographic signatures on e-Passports, because they never installed the right software.

Security 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Health Net Cited for Refusing a Security Audit

Data Breach Today

Why Do Some Companies Reject Security Scrutiny? A government watchdog agency alleges that insurer Health Net of California has refused to cooperate in a security audit called for under a federal contract. Similar disputes often arise when healthcare organizations attempt to scrutinize the security practices of their vendors, some security experts point out.

Security 100

More Trending

article thumbnail

ICO data security statistics highlight need for increased staff awareness

IT Governance

The Information Commissioner’s Office’s (ICO) latest statistics on data security incidents have revealed a 19% increase from Q2 to Q3 2017, with 815 incidents reported between October and December 2017. This is an astonishing 41% rise on the same period in 2016. The reasons are thought to be growing awareness of the General Data Protection Regulation (GDPR) and the launch of the ICO’s personal data breach helpline.

article thumbnail

SEC Publishes New Guidance on Public Company Cybersecurity Disclosures

Hunton Privacy

On February 21, 2018, the U.S. Securities and Exchange Commission (“SEC”) published long-awaited cybersecurity interpretive guidance (the “Guidance”). The Guidance marks the first time that the five SEC commissioners, as opposed to agency staff, have provided guidance to U.S. public companies with regard to their cybersecurity disclosure and compliance obligations.

article thumbnail

Weekly podcast: Reports galore and more cryptojacking

IT Governance

This week, we discuss new reports from Cisco, McAfee and the CSIS, and Big Brother Watch, and hear more about malicious Monero mining. Hello and welcome to the IT Governance podcast for Friday, 23 February 2018. Here are this week’s stories. Cyber security reports are a bit like the proverbial London omnibus: you seem to wait for ages, then several come along at once.

Mining 66
article thumbnail

Cryptojacking Attack Found on Los Angeles Times Website

Threatpost

A security researcher found Coinhive code hidden on a Los Angeles Times’ webpage that was secretly using visitors’ devices to mine cryptocurrency.

Mining 63
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISO 20000: A new career opportunity for auditors

IT Governance

Auditors interested in new areas of expertise might want to consider ISO 20000 , the international standard for IT service management (ITSM). There are many benefits of certifying to the Standard, and it appears people are taking notice. According to the latest ISO survey , there was a 63% year-on-year increase in the number of ISO 20000 certifications awarded.

article thumbnail

What's in store for a FOPM pro at Think 2018

IBM Big Data Hub

Almost any kind of finance and operational performance management (FOPM) professional, from VPs of finance to analysts and others, can learn a lot at Think 2018.

57
article thumbnail

The 5 stages of ITIL

IT Governance

If you deliver IT services to customers, you should be familiar with ITIL ® (Information Technology Infrastructure Library ® ). It’s the most widely adopted IT service management (ITSM) framework in the world, detailing practices that enable you to provide IT services that are better aligned with your organisation’s business needs. There are many benefits of adopting ITIL , but for an in-depth discussion about how it helps organisations, let’s take a look at each of the framework’s five stages.

article thumbnail

Anatomy of an Attack on the Industrial IoT

Dark Reading

How cyber vulnerabilities on sensors can lead to production outage and financial loss.

IoT 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Harassment By Package Delivery

Schneier on Security

People harassing women by delivering anonymous packages purchased from Amazon. On the one hand, there is nothing new here. This could have happened decades ago, pre-Internet. But the Internet makes this easier, and the article points out that using prepaid gift cards makes this anonymous. I am curious how much these differences make a difference in kind, and what can be done about it.

IT 47
article thumbnail

Security Liability in an 'Assume Breach' World

Dark Reading

Cybersecurity today is more than an IT issue. It's a product quality issue, a customer service issue, an operational issue, and an executive issue. Here's why.

article thumbnail

FAQ: What does “obsolete” mean on the retention schedules?

The Texas Record

When you read TSLAC’s local government retention schedules (“local schedules”), you may notice the word “obsolete” pops up in lots of different places. Some folks ask us what we mean when we say obsolete. Obsolete generally refers to a record that is no longer active. How your records management program must treat an obsolete record varies widely depending on how obsolete is used.

article thumbnail

SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks

Dark Reading

New agency guidance statement also says company officials, execs can't trade stocks if they have unannounced information on a security breach at the company.

Risk 51
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ephesoft Names Naren Goel as Chief Financial Officer

Info Source

Irvine, Calif. – Feb. 22, 2018 – Ephesoft, Inc., the leading developer of machine learning-based document capture and analytics solutions, today announced that it has appointed Naren Goel as Chief Financial Officer (CFO). As CFO, Goel will enact a progressive and responsible fiscal model as Ephesoft scales to meet the growing global demand for its technology, which enables organizations to mine their unstructured data.

article thumbnail

It's Not What You Know, It's What You Can Prove That Matters to Investigators

Dark Reading

Achieving the data visibility to ensure you can provide auditors with the information they need after a breach, and do so in just a few days, has never been more difficult.

IT 40
article thumbnail

AI revolution shines the spotlight on GPU potential

Information Management Resources

All of the tasks essential to artificial intelligence can be performed faster than with CPUs, largely because of the speed with which they can transfer data between one another.

article thumbnail

IRS Warns of Spike in W-2 Phishing Emails

Dark Reading

The IRS reports an increase in reports of phishing emails asking for W-2 information.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Once Again, Florida is the Place to Be for eDiscovery Education in March: eDiscovery Best Practices

eDiscovery Daily

I alluded to it last week, now I’ll discuss it in more depth. Next month, the University of Florida E-Discovery Conference will be held on Thursday, March 29 – believe it or not, this is the sixth annual conference. And, for the first time, I’m going to be there! If you’re going to be in Gainesville then too, great! If not, you can still attend from the comfort of your desk at work or at home.

article thumbnail

75 Years of WNYC-FM

Archives Blogs

WNYC-FM’s first antenna on the Municipal Building as it appeared in 1943. (WNYC Archive Collections). On February 24, 1943, WNYC began broadcasting an experimental 1,000-watt frequency modulation (FM) signal at 43.9 megacycles [1] using the call letters W39NY. At that time, only a handful of stations in the U.S. had adopted the technology —after all, this was less than ten years after Major Edwin Armstrong had pioneered wide-band FM transmission from atop the Empire State Building (and lat

article thumbnail

Criminals Obtain Code-Signing Certificates Using Stolen Corporate IDs

Dark Reading

The certificates are available on demand at prices ranging from $299 to $1,599, says Recorded Future.

48
article thumbnail

Crunching car data for cash: An Israeli startup takes on Google

Information Management Resources

Otonomo has developed technology to make it easier to distribute and use connected-car data by securing, anonymizing, standardizing, and aggregating information within a labyrinth of regional regulations.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Best Practices for Recruiting and Retaining Women in Security

Dark Reading

Gender diversity can help fill the security talent gap, new Forrester Research report says.

article thumbnail

A Tale of Two Industries – A Revolution in the Cloud

Docuware

''It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair.” (Charles Dickens, A Tale of Two Cities ).

Cloud 38
article thumbnail

On the hunt for 2116 Maple Street–A house history expedition – Part 2: Photographs

Archives Blogs

The second phase of hunting for information on 2116 Maple Street, after locating it on fire insurance maps, getting the water service records, and getting the building permit register information , involves delving into the Archives’ photographic holdings. Houses in Kitsilano. Reference code: AM1535-: CVA 99-1347. The ideal for every house history researcher is to find an old photograph of his or her house in the Archives’ holdings.