Mon.Oct 15, 2018

article thumbnail

Pentagon Travel Provider Data Breach Counts 30,000 Victims

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed records for an estimated 30,000 civilian and military personnel. The breach alert follows a recent GAO report warning of serious cybersecurity shortcomings in U.S. weapon systems.

article thumbnail

Identifying E-signature Requirements to Accelerate Digital Adoption and Meet Global Compliance

AIIM

Eighteen years after US ESIGN Act and 21 years after the world’s first laws on electronic signatures went into force in Germany and Singapore the benefits of e-signatures are widely understood and many organizations rolled out e-signature to some extent. However, users are reporting mixed experience with some of these solutions: some are not providing a compelling user experience; some have not been designed to support omni-channel strategies; some have found a lack in workflow orchestration, de

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Aetna Hit With More Penalties for Two Breaches

Data Breach Today

Cases Involved Mailings That Potentially Exposed Sensitive Health Information Health insurer Aetna is still paying the price for two 2017 privacy breaches involving mailings that potentially exposed HIV and cardiac condition information about thousands of individuals. Here's the latest update.

Insurance 200
article thumbnail

IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training

Dark Reading

A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

RSA President on the Case for a Risk-Based Security Model

Data Breach Today

CISOs and other security practitioners are embracing the idea of a business-driven security model that takes a risk-oriented approach, says Rohit Ghai, president of RSA. "Cybersecurity conversations are becoming business conversations rather than technology conversations.

Risk 145

More Trending

article thumbnail

Update: NIST Preparing Privacy Framework

Data Breach Today

Building on the success of the NIST Cybersecurity Framework, the National Institute of Standards and Technology is in the early stages of developing a privacy framework. The effort will kick off with a workshop Tuesday in Austin, Texas, explains Naomi Lefkovitz, who is leading the project.

Privacy 133
article thumbnail

Why is the GDPR still something I should be concerned about?

IT Governance

The EU’s GDPR (General Data Protection Regulation) superseded all laws based on the EU’s Data Protection Directive, including the UK’s Data Protection Act 1998, on 25 May 2018. The Regulation expands the rights of individuals to control how their personal data is collected and processed, and places a range of stricter obligations on organisations, making them more accountable for data protection. .

GDPR 90
article thumbnail

Tech Companies Bristle at Australia's Crypto Legislation

Data Breach Today

Latest Draft Still Imperils Privacy and Security, Organizations Contend The disagreements continue over Australia's efforts to pass legislation that would help law enforcement counter encryption. Technology companies and civil liberties organizations contend the latest draft of legislation would allow for too much secrecy and imperil privacy and security.

article thumbnail

Russia-linked BlackEnergy backed new cyber attacks on Ukraine’s state bodies

Security Affairs

The Security Service of Ukraine (SBU) uncovered a new targeted attack launched by BlackEnergy APT on the IT systems of Ukrainian government entities. The Security Service of Ukraine (SBU) uncovered a new targeted attack on the information and telecommunication systems of Ukrainian government entities. The SBU attributed the attack to the BlackEnergy Russia-linked APT group. “The Security Service of Ukraine has received more evidence of the aggressive actions of Russian intelligence service

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Pentagon Data Breach Exposed 30,000 Travel Records

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed an estimated 30,000 civilian and military personnel records. The breach alert follows a recent GAO report warning of serious cybersecurity shortcomings in U.S. weapon systems.

article thumbnail

Branch.io Flaws may have affected as many as 685 million individuals

Security Affairs

More than 685 million users may have been exposed to XSS attacks due to a flaw in Branch.io service used by Tinder, Shopify, and many others. Security Affairs was the first to publish the news of a DOM-XSS Bug Affecting Tinder , Shopify, Yelp, and other dating application. The flaws were disclosed a few days ago by the researchers at vpnMentor who explained that an attacker could have been exploited them to access Tinder users’ profiles. “After initial reconnaissance steps were done, a Ti

article thumbnail

3 Out of 4 Employees Pose a Security Risk

Dark Reading

New MediaPRO study also finds that management performed worse than entry- and mid-level employees in how to handle a suspected phishing email.

Risk 97
article thumbnail

Online market for counterfeit goods in Russia has reached $1,5 billion

Security Affairs

Group-IB: The online market for counterfeit goods in Russia has reached $1,5 billion, while the number of phishing attacks has surpassed 1,200 daily. Group-IB, an international company that specialises in the prevention of cyber attacks, has estimated that online sales of counterfeit goods are now worth $1.5 billion. This information was first made public by experts from Group-IB’s Brand Protection team at the CyberCrimeCon 2018 international cybersecurity conference.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 Security Trends for 2018/2019

Dark Reading

Speaking at the Gartner Symposium/ITxpo, analyst Peter Firstbrook's list of trends is likely to inform executive committee conversations for the next 12 months.

article thumbnail

Why data science at banks is missing the mark, and how to fix it

IBM Big Data Hub

The business that gets there first won’t necessarily win digital and AI game. It will be the one that ingrains digital and AI in its business as much as possible. Starting from applying intelligent data science where it matters most and progressively using it in every aspect of the business.

article thumbnail

Millions of Voter Records Found for Sale on the Dark Web

Dark Reading

Voter registration databases from 19 US states are being hawked in an underground hacking forum, researchers say.

Sales 88
article thumbnail

How the Hortonworks/Cloudera merger shifts the Hadoop landscape

IBM Big Data Hub

The Hadoop landscape looks a little different after Cloudera and Hortonworks’ recent announcement of a $5.2 billion merger.

82
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data breaches – the key questions your board must ask

IT Governance

Data breaches have become a board-level issue for many organisations. The number of incidents only continues to grow, which is something the board must be ready to address. So, what questions should a board be asking in order to be #BreachReady? What personal data do we have on file? Personal data is information that relates to an individual. It can be anything from customer contact info to an employee’s medical history, as long as the individual can be identified or identifiable, directly or in

article thumbnail

How women can close the talent gap in cybersecurity jobs

Information Management Resources

While some women in the cybersecurity field report a high incidence of unconscious discrimination on the job, or report feeling a sense of isolation due to the gender imbalance of men to women, these challenges are not insurmountable.

article thumbnail

4 Ways to Fight the Email Security Threat

Dark Reading

It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.

article thumbnail

Up to 35 Million 2018 Voter Records For Sale on Hacking Forum

Threatpost

Just weeks before the midterms, voter information from 19 states has turned up on the Dark Web.

Sales 83
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

11 device security tips for Cyber Security Month

Jamf

In honor of October being Cyber Security Awareness Month, we take an in-depth look at why security breaches continue to lead the nightly news and what resources and tools are available to ensure device security is at its best.

article thumbnail

Think Like a Hacker: An Offensive Approach to Enterprise Security

eSecurity Planet

Find out how the CISO of an infamously breached website uses an Offensive Risk Management approach to improve the security of his organization.

article thumbnail

72 hours and counting – what you need to know about data breach notifications

IT Governance

Under the EU’s GDPR (General Data Protection Regulations), organisations are required to report certain types of personal data breach to the relevant supervisory body – the ICO (Information Commissioner’s Office) in the UK – within 72 hours of becoming aware of the breach. If the breach poses a high risk to individuals’ rights and freedoms, you must also inform those individuals without undue delay.

article thumbnail

Charting the future of Documentum with OT2

OpenText Information Management

When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server. With OpenText™ OT2, announced at Enterprise World 2018, our customers can rest assured that their investments are not only secure but moving toward the future. OT2 is our next-generation hybrid-cloud platform that brings together intelligent … The post Charting the future of Documentum with OT2 appeared first on OpenText Blogs.

Cloud 50
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Facebook Offers Details on ‘View As’ Breach, Revises Numbers

Threatpost

Facebook's VP of product management was able to discuss more specifics about how the breach itself occurred.

Access 66
article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

By Denise Lebeau-Marianna and Caroline Chancé. Many questions surround the Blockchain’s compatibility with EU General Data Protection Regulation (GDPR). The French Data Protection Supervisory Authority (the CNIL) has recently published its initial thoughts on this topic, providing some responses and practical recommendations on how the usage of a blockchain may be compatible with GDPR and more generally Data Protection Law, taking into account the “constraints” imposed by such technology.

article thumbnail

NotPetya Linked to Industroyer Attack on Ukraine Energy Grid

Threatpost

Evidence shows that three of the most destructive incidents seen in modern cyber-history are the work of one APT.