Wed.Dec 12, 2018

article thumbnail

Congratulations: You Get 'Free' Identity Theft Monitoring

Data Breach Today

Because Breached Businesses' 'Take Your Security Seriously' Is there anything better than being offered one year of "free" identity theft monitoring? Regularly offered with strings attached by organizations that mishandled your personal details, the efficacy and use of such services looks set for a U.S. Government Accountability Office review.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

Is it fair to judge an organization’s information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated software or accidentally exposed data and devices? Fair or not, a number of nascent efforts are using just such an approach to derive security scores for companies and entire industries.

Security 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HIPAA Case: Hospital Fined for Ex-Employee's Access to PHI

Data Breach Today

Enforcement Action is the Third in Recent Weeks, Eighth This Year In its third enforcement action in recent weeks, federal regulators have hit a Colorado medical center with a HIPAA fine in a case involving failure to terminate a former employee's remote access to patient data. Other organizations can use the case as a "teachable moment," one attorney advises.

Access 184
article thumbnail

GUEST ESSAY: Why corporate culture plays such a pivotal role in deterring data breaches

The Last Watchdog

Picture two castles. The first is impeccably built – state of the art, with impenetrable walls, a deep moat, and so many defenses that attacking it is akin to suicide. The second one isn’t quite as well-made. The walls are reasonably strong, but there are clear structural weaknesses. And while it does have a moat, that moat is easily forded. Related podcast: The case for ‘zero-trust’ security.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Marriott: Breach Victims Won't Be Forced Into Arbitration

Data Breach Today

Victims Objected to Terms Of Fraud Monitoring Agreement Breach victims who sign up for free fraud-monitoring services from breached businesses that lost control of their data often sign away their right to join class-action lawsuits or pursue other legal actions, and Marriott proved to be no exception, following its mega-breach. But it now appears to be backing off.

IT 145

More Trending

article thumbnail

A New View of Threat Intelligence: The Last Line of Defense

Data Breach Today

The Role of Threat Intelligence in Cyber Resilience

171
171
article thumbnail

New threat actor SandCat exploited recently patched CVE-2018-8611 0day

Security Affairs

Experts from Kaspersky Lab reported that that the recently patched Windows kernel zero-day vulnerability ( CVE-2018-8611 ) has been exploited by several threat actors. Microsoft’s Patch Tuesday updates for December 2018 address nearly 40 flaws, including a zero-day vulnerability affecting the Windows kernel. The flaw, tracked as CVE-2018-8611, is as a privilege escalation flaw caused by the failure of the Windows kernel to properly handle objects in memory. “An elevation of privilege vulne

article thumbnail

Higher Education: 15 Books to Help Cybersecurity Pros Be Better

Dark Reading

Constant learning is a requirement for cybersecurity professionals. Here are 15 books recommended by professionals to continue a professional's education.

article thumbnail

Cyber attack hit the Italian oil and gas services company Saipem

Security Affairs

Some of the servers of the Italian oil and gas services company Saipem were hit by a cyber attack early this week. Saipem has customers in more than 60 countries, including Saudi Arabian oil and gas giant Saudi Aramco. It could be considered a strategic target for a broad range of threat actors. The attack has been identified out of India on Monday and primarily affected the servers in the Middle East, including Saudi Arabia, the United Arab Emirates, and Kuwait.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Australian Backdoor Law

Schneier on Security

Last week, Australia passed a law [link] the government the ability to demand backdoors in computers and communications systems. Details are still to be defined , but it's really bad. Note: Many people e-mailed me to ask why I haven't blogged this yet. One, I was busy with other things. And two, there's nothing I can say that I haven't said many times before.

article thumbnail

New York Times Reveals Scope of Mobile Apps’ Location Spying

Adam Levin

A New York Times report about the ways smartphone apps track users and sell their location data (on a far greater scale than most customers realize) has gotten much deserved attention this week. One data sample obtained by the Times showed records of a company updating users’ locations up to 14,000 times a day in 2017. While many users allow location tracking on their mobile apps to enable tailored content such as weather or nearby restaurants, they are often unaware that their travel history an

Privacy 77
article thumbnail

A new variant of Shamoon was uploaded to Virus Total while Saipem was under attack

Security Affairs

A new variant of the Shamoon malware, aka DistTrack, was uploaded to VirusTotal from Italy this week, but experts haven’t linked it to a specific attack yet. Shamoon was first observed in 2012 when it infected and wiped more than 30,000 systems at Saudi Aramco and other oil companies in the Middle East. Four years later, a new version ( Shamoon 2 ) appeared in the threat landscape, it was involved in a string of cyber attacks aimed at various organizations in the Persian Gulf, including Saudi Ar

article thumbnail

QueBIT empowers businesses with advanced analytics solutions

IBM Big Data Hub

At QueBIT, our goal is to help organizations of all sizes unlock the full potential of their data, and make analytics accessible for small- and medium-sized businesses.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Driving Documentum forward with Release 16 EP5

OpenText Information Management

OpenText™ Documentum™ excels at enabling companies to maintain control over their critical content, and leverage this content to enhance their business processes In the past month, we’ve announced the availability of OpenText Release 16 Enhancement Pack 5 (EP5) and OpenText Documentum 16.5. Within these releases are two key sets of features that make Documentum even more powerful … The post Driving Documentum forward with Release 16 EP5 appeared first on OpenText Blogs.

article thumbnail

Microsoft, PayPal, Google Top Phishing's Favorite Targets in Q3

Dark Reading

One out of every 100 emails an enterprise receives is a phishing scam, and the attackers behind them are getting more sophisticated.

article thumbnail

How do you create a digital twin?

OpenText Information Management

In my previous blog, I looked at the explosive growth of digital twins. Estimates suggest the number of organizations using digital twins will triple by 2022. In this blog, I’m going to cover what you need to consider when creating a digital twin and the essential role of identity and access management (IAM) in addition … The post How do you create a digital twin?

Access 58
article thumbnail

Worst Password Blunders of 2018 Hit Organizations East and West

Dark Reading

Good password practices remain elusive as Dashlane's latest list of the worst password blunders can attest.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Android Trojan Targets PayPal Users

Threatpost

The trojan purports to be a battery optimization app - and then steals up to 1,000 euro from victims' PayPal accounts.

Access 67
article thumbnail

Bug Hunting Paves Path to Infosec Careers

Dark Reading

Ethical hackers use bug bounty programs to build the skills they need to become security professionals.

article thumbnail

Supply Chain Security: Managing a Complex Risk Profile

Threatpost

Experts sound off on how companies can work with their third-party suppliers and partners to secure the end-to-end supply chain.

Risk 62
article thumbnail

Mac Malware Cracks WatchGuard's Top 10 List

Dark Reading

Security experts advise Mac users to deploy security suites to protect themselves from the growing threat.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Operation Sharpshooter Takes Aim at Global Critical Assets

Threatpost

Operation Sharpshooter uses a new implant to target mainly English-speaking nuclear, defense, energy and financial companies.

article thumbnail

Data Breach News Updates: Equifax’s Congressional Report; Marriott’s China Ties

Rippleshot

This week’s data breach news covers two massive data breaches that have garnered attention on a national and international scale: Equifax and Marriott. The Equifax breach, believed to have impacted 148 million U.S. consumers, has made headlines since it was discovered in September of 2017. The latest report related to the incident comes from a 14-month congressional investigation that suggests that Equifax could have prevented the breach had they followed proper security measures.

article thumbnail

U.S. Defense, Critical Infrastructure Companies Targeted in New Threat Campaign

Dark Reading

McAfee finds malware associated with 'Operation Sharpshooter' on systems belonging to at least 87 organizations.

64
article thumbnail

Super Micro Says Its Gear Wasn’t Bugged By Chinese Spies

Threatpost

The news comes amid reports that a Chinese intelligence-gathering effort was behind the massive Marriott hotel data breach.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Resources for Infosec Skillbuilding

Adam Shostack

Thanks to the kind folks Digital Guardian for including my threat modeling book in their list of “ The Best Resources for InfoSec Skillbuilding.” It’s particularly gratifying to see that the work is standing the test of time.

IT 45
article thumbnail

ABBYY Selects Rusty James to Lead Partner Growth throughout North America

Info Source

MILIPITAS, Calif., Dec. 12, 2018 – ABBYY , a global provider of content intelligent solutions and services, today announced Rusty James has joined the company as the new Head of Partner Business for North America. He will be driving the development and execution of channel partnerships among value-added resellers (VARs), system integrators and independent software vendors (ISVs) to expand the use of ABBYY’s solutions throughout Canada, Mexico and the United States. .

article thumbnail

6 steps to implement a successful data compliance strategy

Information Management Resources

When it comes to data governance, professionals cannot merely assume what they did in 2018 will be sufficient moving forward. Here are six tips for managing and governing data in 2019.