Tue.Dec 18, 2018

article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

Virtually all companies like to say they take their customers’ privacy and security seriously, make it a top priority, blah blah. But you’d be forgiven if you couldn’t tell this by studying the executive leadership page of each company’s Web site. That’s because very few of the world’s biggest companies list any security executives in their highest ranks.

Security 209
article thumbnail

Twitter Sees Signs of State-Sponsored Attack

Data Breach Today

Separately, Steganographic Cybercrime Scheme Employs Malicious Twitter Memes Twitter says that an unspecified number of its users may have been targeted by state-sponsored hackers seeking to unmask their identity. Separately, Trend Micro says Twitter has blocked an account that was posting image memes designed to remotely control malware-infected PCs.

IT 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] A Small Problem with Big Data

AIIM

We have a small problem with Big Data.the majority of us just don't completely understand it. Sure, we've all heard the term "Big Data" - but I'm willing to bet if I asked a room full of people what it was, I'd get puzzled looks and shrugged shoulders from about half the room.and I'm sure I'd lose most of the other half of the room if I followed up that question by asking how to leverage big data for real business value.

article thumbnail

Russian Social Media Interference Continues, Reports Warn

Data Breach Today

Facebook, Google and Twitter's Defenses Don't Appear to be Blocking Campaigns The battle against Russian disinformation is far from over. Two in-depth Senate reports have revealed that such campaigns continue despite efforts by social media companies to cleanse their platforms. Researchers say Facebook's Instagram may be the next battleground.

203
203
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2019 tech predictions from Jamf CEO

Jamf

How will Windows 7 end-of-life (EOL) impact organizations? What does the future of device and user security look like? Jamf CEO, Dean Hager, weighs in on these and other 2019 technology predictions.

Security 108

More Trending

article thumbnail

8 Security Tips to Gift Your Loved Ones For the Holidays

Dark Reading

Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.

Paper 105
article thumbnail

Twitter uncovered a possible nation-state attack

Security Affairs

Twitter discovered a possible nation-state attack while it was investigating an information disclosure flaw affecting its platform. Experts at Twitter discovered a possible state-sponsored attack while they were investigating an information disclosure vulnerability affecting its support forms. The experts discovered that the attack was launched from IP addresses that may be linked to nation-state actors.

IT 83
article thumbnail

Faulty DoD Cybersecurity Leaves U.S. At Risk of Missile Attacks

Adam Levin

The U.S. Ballistic Missile Defense System (BMDS) falls short of critical cybersecurity standards, according to an audit issued by the Department of Defense Inspector General. The report issued by the Inspector General’s office details several basic lapses in security protocols at five separate locations, including: A lack of multifactor authentication to access BMDS technical information.

article thumbnail

Malware controlled through commands hidden in memes posted on Twitter

Security Affairs

New Malware Takes Commands From Memes Posted On Twitter. Security researchers at Trend Micro have spotted a new strain of malware that retrieved commands from memes posted on a Twitter account controlled by the attackers. In this way, attackers make it hard to detect traffic associated with the malware that is this case appears as legitimate Twitter traffic.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2019 Predictions: Information security will be given a seat at the table without asking

Thales Cloud Protection & Licensing

Many years ago, a board member said to me, “We’ve employed you to do information security, so why do we have to do anything?” This was fairly typical. My experience in the past has been that information/cyber security professionals have often been relegated to giving advice on the threat landscape and risks, and then futilely lobbying the board for visibility and resources to put appropriate controls in place.

article thumbnail

Czech cyber-security agency warns over Huawei, ZTE security threat

Security Affairs

A Czech cyber-security agency is warning against using Huawei and ZTE technologies because they pose a threat to state security. The Chinese nightmare is rapidly spreading among European countries, now a Czech cyber-security agency is warning against using the equipment manufactured by Chinese firms Huawei and ZTE because they pose a threat to state security. “The main issue is a legal and political environment of the People’s Republic of China, where (the) aforementioned companies p

article thumbnail

Teaching Cybersecurity Policy

Schneier on Security

Peter Swire proposes a a pedagogic framework for teaching cybersecurity policy. Specifically, he makes real the old joke about adding levels to the OSI networking stack: an organizational layer, a government layer, and an international layer.

article thumbnail

Critical unfixed flaws affect ABB Safety PLC Gateways

Security Affairs

Researchers at Applied Risk discovered serious flaws in some PLC gateways manufactured by industrial tech company ABB. Security experts at Applied Risk are affected by potentially serious flaws and the bad news is that the vendor will not release firmware updates because the impacted products have reached the end of life. The security firm published a security advisory that provides technical details for two vulnerabilities in ABB Pluto Gateway products.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Military Tactics Apply to Cybersecurity

eSecurity Planet

Former West Point professor Greg Conti explains how military doctrines apply to cyber security, and what lessons enterprises can learn from that.

article thumbnail

Memes on Twitter Used to Communicate With Malware

Dark Reading

Steganography via tweet images gave attackers a way to pass on malicious instructions to Trojan, researchers say.

article thumbnail

Directors face £500,000 fines as PECR amendment takes effect

IT Governance

The UK government’s amendment to the PECR (Privacy and Electronic Communications Regulations) took effect on 17 December 2018, increasing the maximum penalty for violations to £500,000. The PECR cover several areas, including electronic marketing, cookies and the security of public electronic communication services. It also prohibits organisations from sending electronic communications without first gaining recipients’ consent.

article thumbnail

WordPress Targeted with Clever SEO Injection Malware

Threatpost

The malware does its best to obfuscate SEO injection in WordPress and evade notice from web admins.

IT 96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The difference between certification and accredited certification

IT Governance

Organisations can gain certification for any number of frameworks and standards. Indeed, we regularly recommend certifying when implementing the likes of ISO 27001 and ISO 22301. But you’ll also hear us talk about ‘ accredited certification ’ – so what’s the difference? What is certification? Certification is the procedure by which a third party gives written assurance that a product, process, system or person has met specified requirements.

article thumbnail

How to Engage Your Cyber Enemies

Dark Reading

Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.

79
article thumbnail

How to choose the best AI-powered analytics software in 2019

OpenText Information Management

For almost as long as there has been business, there has been business analytics. Frederick W. Taylor is often credited with introducing business analytics in the late 1800s. Artificial intelligence hasn’t been around for quite so long but the start of modern AI can be traced back to the 1950s. Artificial intelligence (AI) software is … The post How to choose the best AI-powered analytics software in 2019 appeared first on OpenText Blogs.

article thumbnail

When Cryptocurrency Falls, What Happens to Cryptominers?

Dark Reading

The fall of cryptocurrency's value doesn't signify an end to cryptomining, but attackers may be more particular about when they use it.

IT 77
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to protect your digital privacy from new Christmas presents

The Guardian Data Protection

Just unwrapped a gift of an internet-connected device? Don’t just turn it on and plug it in – you might be giving the manufacturer all sorts of information you don’t need to Jeff Bezos knows when you’ve been sleeping, he knows when you’re awake, he knows when you’ve been bad or good, because you didn’t change the default privacy settings on the Amazon smart speaker you set up in your bedroom, for goodness’ sake.

Privacy 60
article thumbnail

How can Scottish businesses maintain Britain’s best data protection compliance record?

IT Governance

Pre GDPR…. Just prior to the EU General Data Protection Regulation (GDPR) coming into effect Scotland had Britain’s best compliance record with data protection laws, with just 1.9% of a total £4.2m in fines being issued north of the Border. Maintaining this record will be challenging. There are new pressures under the GDPR and with Edinburgh now seeking to become the data capital of Europe , there will be further stresses placed on Scottish businesses in terms of simply managing the additi

article thumbnail

Dutch DPA Publishes Post-GDPR Complaints Report

Hunton Privacy

On December 13, 2018, the Dutch Data Protection Authority (“ Autoriteit Persoonsgegevens ”) (the “Dutch DPA”) published a report on the complaints it has received since the EU General Data Protection Regulation (“GDPR”) became applicable on May 25, 2018 (the “Report”). The GDPR gives data subjects the right to lodge a complaint with the relevant national supervisory authority when they believe that their personal data is processed in a way violative of the GDPR (see article 77 of the GDPR).

GDPR 59
article thumbnail

Cryptographic Erasure: Moving Beyond Hard Drive Destruction

Dark Reading

In the good old days, incinerating backup tapes or shredding a few hard drives would have solved the problem. Today, we have a bigger challenge.

65
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

10 Tips for sensible and defensible Records Management

OpenText Information Management

A carefully crafted records management solution is the backbone of any – and ideally, every – enterprise compliance initiative. But getting the project off the ground can be a thorny proposition, with multiple stakeholders, contrasting agendas, sporadic user adoption, and other unforeseen issues. Even just one of these obstacles can stall a records management project. … The post 10 Tips for sensible and defensible Records Management appeared first on OpenText Blogs.

article thumbnail

Digitalizing the bank: Challenges, opportunities and strategies

CGI

Digitalizing the bank: Challenges, opportunities and strategies. pallavi.m@cgi.com. Tue, 12/18/2018 - 22:19. Many believe that digitalizing the bank is all about transforming the customer journey and experience. Others think it involves primarily the back office. It’s really about both, with some product re-engineering thrown in, too. Digitalizing involves redesigning how customers interact with the bank, changing product design, as well as simplifying and bundling back-end processes.

article thumbnail

Updated Dynamsoft Barcode Reader SDK Allows App-Less Smartphone Scanning from Browsers

Info Source

VANCOUVER – Dec. 17, 2018 – Dynamsoft has updated its Barcode Reader Software Development Kit as a pure JavaScript API Edition, based on WebAssembly, to enable cross-browser and cross-platform online barcode scanning. These new features will empower developers with new conveniences for users. Users can scan barcodes in real-time from a browser using their smartphone without requiring an app download.

IT 51