Tue.Nov 05, 2019

Goodbye, Symantec for Consumers; Hello NortonLifeLock

Data Breach Today

Era Ends With Broadcom's Buy of Symantec's Enterprise Assets for $10.7 Billion Say hello to NortonLifeLock, as Symantec anti-virus for consumers is no more, following the sale of Symantec's enterprise assets and name to Broadcom for $10.7 billion.

Sales 182

So, what did I think of ARMA InfoCon 2019? Here, let me tell you!

Weissman's World

ARMA InfoCon 2019 was an eye-opener, thanks in large part to a healthy injection of information governance into the proceedings. Thanks, no doubt, to the merger of the Information Coalition with ARMA last year.)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Making Email Safe Again

Data Breach Today

Sudeep Venkatesh of Egress Offers New Security Perspectives Maliciously or unintentionally, people cause data breaches via email. But email is an essential part of enterprise life. How can the channel be made more secure? Sudeep Venkatesh of Egress offers new perspectives

‘Light commands’ attack: hacking Alexa, Siri, and other voice assistants via Laser Beam

Security Affairs

Experts demonstrated that is possible to hack smart voice assistants like Siri and Alexa using a lasers beam to send them inaudible commands.

Paper 82

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Beam Me Up, Alexa: Digital Assistants Hacked By Lasers

Data Breach Today

Lasers Mimicking Voice Commands Can Open Doors It's a laser-focused hack. Literally.

IT 164

More Trending

Latest BEC Victims: Nikkei, City of Ocala

Data Breach Today

Japanese Media Giant and Florida City Hit by Separate Business Email Compromises Business email compromise scams continue to proliferate. Last week, Japanese media company Nikkei revealed that an employee made a $29 million fraudulent transfer as a result of a scam.

151
151

Disclosure Does Little to Dissuade Cyber Spies

Dark Reading

In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations

76

OCR Issues Two HIPAA Enforcement Actions, Plus Adjusts Future Fines

Data Breach Today

Settlement With University of Rochester Medical Center, Penalty for Texas HHS Commission Federal regulators have slapped two more organizations with hefty HIPAA enforcement fines.

141
141

Obfuscation as a Privacy Tool

Schneier on Security

This essay discusses the futility of opting out of surveillance, and suggests data obfuscation as an alternative.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Identity as the New Security Perimeter

Data Breach Today

Okta's Teju Shyamsundar on the Evolution of Holistic Protection The shift to the cloud has made the perimeter-centric view of security obsolete and led to the creation of the "zero trust" approach. But how do we best manage identity as the new security perimeter?

Cloud 141

The State of Email Security and Protection

Dark Reading

Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with

Cyber Insurance: Benefits and Pitfalls

Data Breach Today

Martin Overton on What to Look for in an Effective Cyber Policy Martin Overton has worked both in cybersecurity and insurance, so he has a unique perspective on cyber insurance - the genuine benefits as well as the potential pitfalls. He shares tips on what to seek in an effective policy

Google Is Helping Design an Open Source, Ultra-Secure Chip

WIRED Threat Level

Open Titan is a so-called secure enclave based on open source that could shake up hardware security. Security Security / Security News

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

2 Ransomware Attacks Reported in Spain

Data Breach Today

Radio Network, Consultancy Are Targeted In two separate incidents on Monday, ransomware crippled the systems of a radio network and a major consulting firm in Spain, according to local news reports

Mysterious DarkUniverse APT remained undetected for 8 years

Security Affairs

Kaspersky discovered a previously unknown APT group, tracked as DarkUniverse , by analyzing Shadow Brokers’ “ Lost in Translation ” data dump.

Phishing Campaign Uses Salary Increase Ploy: Report

Data Breach Today

Message About a Raise Designed to Harvest Credentials A new phishing campaign lures employees with a message about a salary increase, according to researchers at the security firm Cofense. The campaign is designed to harvest Office 365 credentials

Hackers finding ways to exploit automotive software to overtake cars via Tech Republic

IG Guru

This news is not new news to those who attend hacker cons, but it is important for car makers and auto suppliers to take cyber security seriously. Check out the article here or at the source.

IT 69

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Business Email Compromise: Battling Advanced Attackers

Data Breach Today

Ultra-Lucrative Campaigns Continue, Warns David Stubley of 7 Elements Many businesses don't seem to be able to block the ongoing scourge of sophisticated business email compromise schemes.

Predictive analytics for detection and response

OpenText Information Management

Enterprise security professionals today can prevent many attacks on their organization’s endpoints, thanks to ever-improving defensive tools that work across public and private clouds as well as on premise.

Inside the Sophos 2020 Threat Report

Data Breach Today

The Sophos 2020 Threat Report is out, and among the key findings: Ransomware attackers continue to leverage automated active attacks that can evade security controls and disable backups to do maximum damage in minimal time. John Shier of Sophos analyzes the trends that are most likely to shape the 2020 cybersecurity landscape

Shadow IT flourishes when organizations stifle collaborations

Information Management Resources

Organizations would benefit if leaders were more collaborative with their businesses about finding ways to let employees be more productive without introducing security risks, a new study says

Risk 64

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Ransomware attack impacted government services in the territory of Nunavut, Canada

Security Affairs

A ransomware attack disrupted IT operations in the territory of Nunavut (Canada), all government services requiring access to electronic data were impacted.

CrowdStrike Adds New Products & Web Store Apps

Dark Reading

Company introduces Falcon for AWS, Falcon Firewall Management, and third-party applications

61

Report: The Government and Tech Need to Cooperate on AI

WIRED Threat Level

It also warns that AI-enhanced national security apparatus like autonomous weapons and surveillance systems will raise ethical questions. Business Business / Artificial Intelligence Security

So, how much is this damn CCPA thing gonna #$@&%* cost me?!

Information Governance Perspectives

As I've traveled around California doing my "Blessings of the CCPA" presentation, I've been asked repeatedly about the "average" cost of a CCPA solution from CFO's, GC's and IT folks alike.

IT 60

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

The Story of Sandworm, the Kremlin's Most Dangerous Hackers

WIRED Threat Level

For three years, WIRED has tracked the elite and shadowy Russian vanguard of cyberwar. Security Security / Cyberattacks and Hacks

Preservica congratulates 2019 Emmett Leahy Award winner

Preservica

Preservica, the market leader in active digital preservation software, is proud to extend its support for the Emmett Leahy Award , and offer congratulations to 2019 winner, Simon Fook-Keung Chu of Hong Kong.

Navigating China: The digital journey

DLA Piper Privacy Matters

Episode 6: Further developments in PRC data privacy regulations.