Tue.Nov 05, 2019

OCR Issues Two HIPAA Enforcement Actions, Plus Adjusts Future Fines

Data Breach Today

Settlement With University of Rochester Medical Center, Penalty for Texas HHS Commission Federal regulators have slapped two more organizations with hefty HIPAA enforcement fines.

130
130

So, what did I think of ARMA InfoCon 2019? Here, let me tell you!

Weissman's World

ARMA InfoCon 2019 was an eye-opener, thanks in large part to a healthy injection of information governance into the proceedings. Thanks, no doubt, to the merger of the Information Coalition with ARMA last year.)

Identity as the New Security Perimeter

Data Breach Today

Okta's Teju Shyamsundar on the Evolution of Holistic Protection The shift to the cloud has made the perimeter-centric view of security obsolete and led to the creation of the "zero trust" approach. But how do we best manage identity as the new security perimeter?

Cloud 130

Report: The Government and Tech Need to Cooperate on AI

WIRED Threat Level

It also warns that AI-enhanced national security apparatus like autonomous weapons and surveillance systems will raise ethical questions. Business Business / Artificial Intelligence Security

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Making Email Safe Again

Data Breach Today

Sudeep Venkatesh of Egress Offers New Security Perspectives Maliciously or unintentionally, people cause data breaches via email. But email is an essential part of enterprise life. How can the channel be made more secure? Sudeep Venkatesh of Egress offers new perspectives

More Trending

Cyber Insurance: Benefits and Pitfalls

Data Breach Today

Martin Overton on What to Look for in an Effective Cyber Policy Martin Overton has worked both in cybersecurity and insurance, so he has a unique perspective on cyber insurance - the genuine benefits as well as the potential pitfalls. He shares tips on what to seek in an effective policy

Tokio Marine Asia and Ephesoft Announce Partnership to Advance Thai Language Recognition

Document Imaging Report

Teams collaborate to enhance Thai language recognition for intelligent document capture, back-office automation in Thailand. IRVINE, Calif. and Singapore – Nov. 5, 2019 – Ephesoft, Inc. ,

2 Ransomware Attacks Reported in Spain

Data Breach Today

Radio Network, Consultancy Are Targeted In two separate incidents on Monday, ransomware crippled the systems of a radio network and a major consulting firm in Spain, according to local news reports

Mysterious DarkUniverse APT remained undetected for 8 years

Security Affairs

Kaspersky discovered a previously unknown APT group, tracked as DarkUniverse , by analyzing Shadow Brokers’ “ Lost in Translation ” data dump.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Latest BEC Victims: Nikkei, City of Ocala

Data Breach Today

Japanese Media Giant and Florida City Hit by Separate Business Email Compromises Business email compromise scams continue to proliferate. Last week, Japanese media company Nikkei revealed that an employee made a $29 million fraudulent transfer as a result of a scam.

130
130

So, how much is this damn CCPA thing gonna #$@&%* cost me?!

Information Governance Perspectives

As I've traveled around California doing my "Blessings of the CCPA" presentation, I've been asked repeatedly about the "average" cost of a CCPA solution from CFO's, GC's and IT folks alike.

IT 52

Phishing Campaign Uses Salary Increase Ploy: Report

Data Breach Today

Message About a Raise Designed to Harvest Credentials A new phishing campaign lures employees with a message about a salary increase, according to researchers at the security firm Cofense. The campaign is designed to harvest Office 365 credentials

Predictive analytics for detection and response

OpenText Information Management

Enterprise security professionals today can prevent many attacks on their organization’s endpoints, thanks to ever-improving defensive tools that work across public and private clouds as well as on premise.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Business Email Compromise: Battling Advanced Attackers

Data Breach Today

Ultra-Lucrative Campaigns Continue, Warns David Stubley of 7 Elements Many businesses don't seem to be able to block the ongoing scourge of sophisticated business email compromise schemes.

Navigating China: The digital journey

DLA Piper Privacy Matters

Episode 6: Further developments in PRC data privacy regulations.

Beam Me Up, Alexa: Digital Assistants Hacked By Lasers

Data Breach Today

Lasers Mimicking Voice Commands Can Open Doors It's a laser-focused hack. Literally.

IT 130

The need for continuous endpoint visibility

OpenText Information Management

In the world of security, you can always count on one simple truth: you can’t respond to a threat that hasn’t been detected.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Goodbye, Symantec for Consumers; Hello NortonLifeLock

Data Breach Today

Era Ends With Broadcom's Buy of Symantec's Enterprise Assets for $10.7 Billion Say hello to NortonLifeLock, as Symantec anti-virus for consumers is no more, following the sale of Symantec's enterprise assets and name to Broadcom for $10.7 billion.

Sales 130

A new look lets you look deeper into your backups: Rocket Servergraph 9.2 now available!

Rocket Software

Rocket Servergraph is our flagship data protection and storage monitoring/capacity planning solution.

Inside the Sophos 2020 Threat Report

Data Breach Today

The Sophos 2020 Threat Report is out, and among the key findings: Ransomware attackers continue to leverage automated active attacks that can evade security controls and disable backups to do maximum damage in minimal time. John Shier of Sophos analyzes the trends that are most likely to shape the 2020 cybersecurity landscape

If You’re Not Requesting Slack Data in Ediscovery—or Preserving It—What Are You Waiting For?

Hanzo Learning Center

When you start an ediscovery project, are you explicitly asking your opponents to produce data from the collaboration application Slack?

IT 52

Obfuscation as a Privacy Tool

Schneier on Security

This essay discusses the futility of opting out of surveillance, and suggests data obfuscation as an alternative.

Google Is Helping Design an Open Source, Ultra-Secure Chip

WIRED Threat Level

Open Titan is a so-called secure enclave based on open source that could shake up hardware security. Security Security / Security News

Ransomware attack impacted government services in the territory of Nunavut, Canada

Security Affairs

A ransomware attack disrupted IT operations in the territory of Nunavut (Canada), all government services requiring access to electronic data were impacted.

Hackers finding ways to exploit automotive software to overtake cars via Tech Republic

IG Guru

This news is not new news to those who attend hacker cons, but it is important for car makers and auto suppliers to take cyber security seriously. Check out the article here or at the source.

IT 52

‘Light commands’ attack: hacking Alexa, Siri, and other voice assistants via Laser Beam

Security Affairs

Experts demonstrated that is possible to hack smart voice assistants like Siri and Alexa using a lasers beam to send them inaudible commands.

PrivSec New York

Data Matters

Sidley partners William Long and Alan Raul will be speaking at the PrivSec Conference in New York, November 6. Join them for a discussion on recent GDPR enforcement cases and how it impacts the U.S. and global privacy programs. For more event information, click here. The post PrivSec New York appeared first on Data Matters Privacy Blog. Events General

GDPR 60