Wed.May 09, 2018

article thumbnail

Tailoring an Incident Response Plan

Data Breach Today

Attorney Ron Raether Discusses Legal Considerations Incident response plans must be carefully designed to meet the needs of a specific organization, says attorney Ron Raether, who outlines important legal considerations.

100
100
article thumbnail

Resourceful Records Managers

The Schedule

Our most recent records manager profile: Eira Tansey, Digital Archivist/Records Manager at the University of Cincinnati ! If you want to be included contact Jessika Drmacich at jgd1(at)williams(dot)edu! photo by Cassandra Zetta. 1. What led you to choose your current career in Records Management? After college, I worked for several years in a paraprofessional capacity in New Orleans.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Day Attack Exploits Windows via Malicious Word Doc

Data Breach Today

Microsoft Patches Flaw, Warns It Could Be Exploited via Websites, Malvertising Security alert: Microsoft has issued updates to fix 67 unique flaws in its products. One vulnerability in Windows VBScript engine is already being actively exploited in the wild via malicious Word documents and could also be employed for attacks via websites and malvertising, Microsoft warns.

Security 182
article thumbnail

Data rules threaten 'last avenue' used in thousands of immigration cases

The Guardian Data Protection

Home Office figures show there were almost 25,950 subject access requests for files in 2016 Tens of thousands of people each year could be prevented from obtaining information about their own immigration status under new data protection powers, Home Office figures reveal. Changes proposed in the data protection bill, which was being debated by MPs on Wednesday, would deprive applicants of a reliable means of obtaining files on themselves from the department through what are known as subject acce

Access 83
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Modern Identity and Access Management

Data Breach Today

How do we establish and maintain digital trust without burdening our users? What are the critical questions that need to be addressed by anyone managing identity and access management in a modern enterprise? David Duncan of CA Technologies offers answers to these questions.

Access 100

More Trending

article thumbnail

Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report. But security experts say the weaknesses are quite common at civilian health facilities as well.

Military 100
article thumbnail

Facial Recognition Tech Is Creepy When It Works—And Creepier When It Doesn’t

WIRED Threat Level

It's a powerful tool, but recent incidents have shown that there's no winning with facial recognition.

IT 94
article thumbnail

Spectre: The Next Generation

Data Breach Today

Intel Preps Fixes for Eight New Spectre/Meltdown-Like CPU Flaws, Report Says Spectre and Meltdown: It's déjà vu all over again as Intel is reportedly prepping a coordinated vulnerability disclosure announcement for eight new speculative execution flaws. One of the new flaws is apparently worse than any of the three Spectre/Meltdown variants that came to light in January.

IT 100
article thumbnail

Free download: Find out how ISO 27001 can help you comply with the GDPR

IT Governance

The EU General Data Protection Regulation (GDPR) comes into force next month, and states that organisations must adopt appropriate policies, procedures and processes to protect the personal data they hold. . Noncompliance can result in fines of up to €20 million or 4% of an organisation’s global annual turnover. Fortunately, ISO 27001 , the international standard that describes best-practice for implementing an information security management system (ISMS), can help you with your compl

GDPR 70
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Shifts in the Retail Fraud Landscape

Data Breach Today

Shamoun Siddiqui, CISO at Neiman Marcus, Highlights Emerging Fraud Schemes The rollout of EMV in the U.S. has transformed the card fraud landscape, with a major shift to online channels, says Shamoun Siddiqui, CISO at retailer Neiman Marcus.

Retail 100
article thumbnail

Where does data flow mapping fit into your GDPR compliance project?

IT Governance

A data flow map should be one of the first things your organisation produces as you prepare for the EU General Data Protection Regulation (GDPR). It helps you identify all the information you hold and how it transfers from one location to another, such as from suppliers and sub-suppliers through to customers. You might be surprised at how often your information is copied or transferred, which is why the GDPR makes it such a top priority.

GDPR 66
article thumbnail

The Legal Case for a Coherent Risk Analysis Program

Data Breach Today

Attorney Shawn Tuma on Improving Cybersecurity and Regulatory Compliance A coherent risk analysis program tailored to the organization is a vital component of any effort to improve cybersecurity and meet regulatory requirements, says attorney Shawn Tuma.

Risk 100
article thumbnail

Nutanix and Thales, Hyerconverged & Hypersecure

Thales Cloud Protection & Licensing

The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. As the market leader in this space, the Nutanix Enterprise Cloud is on the forefront of integrating virtualization, storage, networking, and security, in a turnkey HCI solution.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Virginia Beach Police Want Encrypted Radios

Schneier on Security

This article says that the Virginia Beach police are looking to buy encrypted radios. Virginia Beach police believe encryption will prevent criminals from listening to police communications. They said officer safety would increase and citizens would be better protected. Someone should ask them if they want those radios to have a backdoor.

article thumbnail

Admins: Enforce complex passwords and two-factor authorization

OneHub

Last week brought news that not one but two vital internet services experienced bugs that exposed user passwords. On May 1, code repository site, Github announced that “a small number of user passwords” were exposed, and then two days later, Twitter suffered a similar error that caused the company to recommend everyone change their password.

article thumbnail

Compliance Complexity: The (Avoidable) Risks of Not Playing by the Rules

Dark Reading

Achieving compliance is a challenging process, but with the right systems and customized data management policy, your organization can stay ahead of the next data breach -- and the regulators.

article thumbnail

Key Steps for Optimizing POS Security

eSecurity Planet

It's not just about PCI DSS compliance – here are three important factors in a POS security solution, plus other ways to avoid credit card breaches.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Email Security Tools Try to Keep Up with Threats

Dark Reading

Email has long been a prime vector for cyberattacks, and hackers are only getting sneakier. Can email platforms and security tools keep up?

article thumbnail

OpenText Captiva gets enhanced automation and scalability

OpenText Information Management

For many enterprise customers, successful digital transformation means moving capture into a robust platform that can meet existing, and future, capture needs—while providing an efficient and largely automated experience for end users. For the new release of OpenText Captiva 7.7, the focus has been on expanding the ease of use across the enterprise and enhancing … The post OpenText Captiva gets enhanced automation and scalability appeared first on OpenText Blogs.

article thumbnail

Millennials, Women May Bridge Cyber Talent Gap

Dark Reading

Younger generations, particularly women, could be the answer to a cybersecurity skill shortage expected to reach 1.8 million unfilled roles by 2020.

article thumbnail

The cost of non-compliance is what?!

Hanzo Learning Center

Let’s have some real talk for a second, friends. The situation around MiFID II is a powderkeg in some respects. Here’s the essential problem: only 46% of those responsible for MiFID II within organizations are even familiar with the requirements.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Calculating Cloud Cost: 8 Factors to Watch

Dark Reading

If you're not careful and don't regularly assess the impact of your usage, moving to the cloud could have a negative impact on your bottom line.

Cloud 48
article thumbnail

Former Football Players Sanctioned for Failure to Produce: eDiscovery Case Law

eDiscovery Daily

In Michael E. Davis, et al. v. Electronic Arts, Inc., No. 10-cv-03328-RS, (N.D. Cal., April 3, 2018) , California Magistrate Judge Donna M. Ryu ruled that the plaintiff’s failure to fully comply with the discovery requests by the defendant were sanctionable under FRCP Rule 37, which states, “Such sanctions may include ordering a party to pay the reasonable expenses, including attorneys’ fees, caused by its failure to comply with the order or rule.” Case Background.

article thumbnail

Phishing Threats Move to Mobile Devices

Dark Reading

Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.

article thumbnail

Bugs in Logitech Harmony Hub Put Connected IoT Devices at ‘High Risk’

Threatpost

Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security.

IoT 44
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

20 Signs You Are Heading for a Retention Problem

Dark Reading

If you don't invest in your best security talent, they will look to burnish their resumes elsewhere. Here's why.

article thumbnail

Georgia Governor Vetoes Controversial Hack-Back Bill

Threatpost

The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack.

article thumbnail

FBI: Reported Internet Crimes Topped $1.4 Billion Last Year

Dark Reading

Business email compromise (BEC) campaigns outnumbered ransomware cases.