Tue.Mar 27, 2018

article thumbnail

Misconfigured Server Exposes Patient Data

Data Breach Today

Security Researcher Discovers Apparent Breach at Medical Practice A medical practice's misconfigured database server that allegedly exposed information about thousands of patients plus staff serves as another reminder about the importance of safeguarding sensitive data from exposure on the internet.

Security 179
article thumbnail

What's in an Event Name? -- Reflections on Think2018

AIIM

I was invited to attend the IBM Think 2018 event last week in Las Vegas. There were so many interesting aspects of the event, but most notable to me as someone who has attended multiple versions of this event over the years under multiple names (multiple event names, not my aliases) were: 1) the sheer scale of the event; and 2) the convergence of content and data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spain Busts Alleged Kingpin Behind Prolific Malware

Data Breach Today

$1 Billion in Losses Tied to Gang Wielding Carbanak and Cobalt Malware The alleged leader of a cybercrime gang tied to more than $1 billion in losses has been arrested in Alicante, Spain. Authorities say "Denis K." is a Ukrainian national who led a gang that developed Carbanak and Cobalt malware to infect PCs as well as perpetrate ATM jackpotting attacks.

145
145
article thumbnail

Inside Fort Gordon: Where Next-Gen Cyber Troops Are Trained

WIRED Threat Level

What's happening at the US Army's new cyber branch headquarters marks a change for Fort Gordon. Hell, it might be changing warfare itself—all through a computer screen.

IT 108
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Unraveling the Cyber Skills Gap

Data Breach Today

Two out of three organizations say that finding qualified cybersecurity professionals is a struggle, a new study shows. And 80 percent of respondents do not feel adequately prepared to defend their organizations. Kathie Miley of Cybrary and Wade Baker of Cyentia Institute discuss how to bridge the cyber skills gap.

More Trending

article thumbnail

The Facebook Privacy Setting That Doesn’t Do Anything at All

WIRED Threat Level

For years, Facebook has left a privacy setting on its site that addresses a problem that no longer exists.

Privacy 98
article thumbnail

How penetration testing can help you comply with the GDPR

IT Governance

You might be a small organisation that’s seemingly below cyber criminals’ radar, but you are far from immune to data breaches. Small and medium-sized enterprises account for a large proportion of cyber attacks, victims of random and indiscriminate attacks that target vulnerabilities, rather than specific organisations. The Cyber Security Breaches Survey 2017 shows just how prevalent the issue is.

GDPR 75
article thumbnail

Monero Privacy Protections Aren’t as Strong as They Seem

WIRED Threat Level

Researchers point out serious gaps in the privacy promises of stealth cryptocoin Monero.

Privacy 98
article thumbnail

Supply chain transformation cannot be delayed just because it’s hard to achieve

OpenText Information Management

Getting everyone inside a retail business to collaborate around the shared goal of serving the customer better sounds easy, until you remember that this was not how retailing was set up. Driven entirely by supply from scratch, the industry did not expect today to have to turn things completely around the other way, to focus … The post Supply chain transformation cannot be delayed just because it’s hard to achieve appeared first on OpenText Blogs.

Retail 63
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

Recently, I've witnessed a couple of incidents which have caused me to question some pretty fundamental security basics with our local Aussie telcos, specifically Telstra and Optus. It began with a visit to the local Telstra store earlier this month to upgrade a couple of phone plans which resulted in me sitting alone by this screen whilst the Telstra staffer disappeared into the back room for a few minutes: Is it normal for @Telstra to display customer passwords on publicly facing terminals in

article thumbnail

CIPL and AvePoint Release Second Global GDPR Readiness Report

Hunton Privacy

On March 26, 2018, the Centre for Information Policy Leadership at Hunton & Williams LLP and AvePoint released its second Global GDPR Readiness Report (the “Report”), detailing the results of a joint global survey launched in July 2017 concerning organizational preparedness for implementing the EU General Data Protection Regulation (“GDPR”). The Report tracks the GDPR implementation efforts of over 235 multinational organizations, and builds on the findings of the first Global GDPR Readines

GDPR 58
article thumbnail

Calculating How Much You Need to Scan (And How Much It Will Cost)

Record Nations

With the help of records scanning services, your business can make the leap into the digital world with faster, more organized records and files. Watch the video to learn how to calculate the costs for your scanning project. Video Transcription Where to Start When planning a scanning project the first question typically is price. On […]. The post Calculating How Much You Need to Scan (And How Much It Will Cost) appeared first on Record Nations.

IT 65
article thumbnail

DHS And FBI Issue Joint Warning – Hackers Have Targeted Critical Sector Industries Since March 2016

Privacy and Cybersecurity Law

On March 15, 2018, the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) issued a joint […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UVA Defeats UMBC, in Stunning Upset

Dark Reading

In first trip to Mid-Atlantic Collegiate Cyber Defense Competition, University of Virginia's Cyber Defense Team defeats reigning national champs from University of Maryland, Baltimore County.

47
article thumbnail

Alleged Mastermind Behind Carbanak Crime Gang Arrested

Threatpost

The suspected leader behind the cyber crime group that targeted banks to rack up more than one billion Euros in damage over the past few years has been apprehended, according to the Spanish National Police.

article thumbnail

780 Days in the Life of a Computer Worm

Dark Reading

This is a story of a worm, from the time it was coded and deployed onto the Internet. It is narrated by the worm in the first person.

IT 56
article thumbnail

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. .

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fooling Face Recognition with Infrared Light

Schneier on Security

Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post.

55
article thumbnail

Privacy: Do We Need a National Data Breach Disclosure Law?

Dark Reading

Some say we need a more consistent approach, while others worry a national law might supersede and water down some state laws already on the books.

article thumbnail

Facebook Cracks Down On Data Misuse With Expanded Bug Bounty Program

Threatpost

Facebook announced that in the coming weeks it will expand its bug bounty program as the company cracks down on data misuse by app developers.

IT 51
article thumbnail

Attackers Shift From Adobe Flaws to Microsoft Products

Dark Reading

Seven of the Top 10 most commonly exploited vulnerabilities in 2017 were Microsoft-related - not Adobe Flash as in years past, Recorded Future found.

49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Off-Site Storage for Insurance Companies

Armstrong Archives

Your insurance company has been collecting and storing consumer data for as long as it’s been in business. That information is vital to your everyday operation, and it’s vulnerable to security breech. A breech could cause legal issues, lost customers, and diminished profits. Many companies look to off-site storage for an affordable, secure solution.

article thumbnail

Report Shows Ransomware is the New Normal

Dark Reading

A new report on malware says that the majority of companies globally have been victims of ransomware in the last 12 months.

article thumbnail

7 steps to ensure an organization is GDPR-ready

Information Management Resources

From determining how to securely store and organize data to auditing the processes already in place, IT leaders can use these practices to close the GDPR compliance gap once and for all.

GDPR 34
article thumbnail

Bad Bots Increasingly Hide Out in Cloud Data Centers

Dark Reading

Humans accounted for nearly 58% of website traffic in 2017 -- the rest were bad and good bots.

Cloud 48
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Edge computing and the future of the data center

Information Management Resources

This technology involves and explicitly calls for the handling of data processing on the edge of a network, as opposed to locally on a device or local network.

36
article thumbnail

Grossman, 'RSnake' Launch Website Asset Inventory Startup

Dark Reading

Bit Discovery gets $2.7 million in seed-round funding; Alex Stamos, Jeff Moss among the investors.

43
article thumbnail

A look inside American Family Insurance's digital transformation office

Information Management Resources

Led by chief digital transformation officer Todd Fancher, AmFam's innovation strategy will lean on small teams and focus on customer experience.