Wed.Dec 15, 2021

article thumbnail

Why We Need "Developer-First" Application Security

Dark Reading

The way to improve the security of the modern software development life cycle and reduce the number of application-based breaches is to re-center app security around the needs of developers.

article thumbnail

NYC to Regulate Artificial Intelligence-Based Hiring Tools

Hunton Privacy

On November 10, 2021, the New York City Council passed a bill prohibiting employers and employment agencies from using automated employment decision tools to screen candidates or employees, unless a bias audit has been conducted prior to deploying the tool (the “Bill”). The Bill defines an “automated employment decision tool” as any computational process (either derived from machine learning, statistical modeling, data analytics, or artificial intelligence) that issues a simplified output ( e.g.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When is a Scrape a Breach?

Troy Hunt

A decade and a bit ago during my tenure at Pfizer, a colleague's laptop containing information about customers, healthcare providers and other vendors was stolen from their car. The machine had full disk encryption and it's not known whether the thief was ever actually able to access the data. It's not clear if the car was locked or not.

article thumbnail

Prioritizing IT automation: A four-step approach

DXC Technology

As fast as the world and technology evolve, IT departments are evolving with it. To stay ahead of all this change, IT leaders need to free up time for the most important tasks. Automation is an obvious answer to do this. If you can automate the high-volume, low-complexity tasks that drain resources, you can boost […]. The post Prioritizing IT automation: A four-step approach appeared first on DXC Blogs.

IT 123
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw

eSecurity Planet

Nation-state cyber threat groups and ransomware attackers are moving in to exploit a critical flaw found in the seemingly ubiquitous Apache Log4j open-source logging tool, as attacks spread just days after the vulnerability that could affect hundreds of millions of devices was made public late last week. Microsoft researchers reported that the remote code execution (RCE) vulnerability is being exploited by nation-state groups associated with China, North Korea, Iran and Turkey, with the activity

More Trending

article thumbnail

Apache’s Fix for Log4Shell Can Lead to DoS Attacks

Threatpost

Not only is the jaw-dropping flaw in the Apache Log4j logging library ubiquitous; Apache’s blanket of a quickly baked patch for Log4Shell also has holes.

Libraries 119
article thumbnail

Microsoft December 2021 Patch Tuesday fixes an actively exploited zero-day

Security Affairs

Microsoft December 2021 Patch Tuesday addresses 67 vulnerabilities, including an actively exploited Windows Installer vulnerability. Microsoft December 2021 Patch Tuesday addressed 67 vulnerabilities in Microsoft Windows and Windows Components, ASP.NET Core and Visual Studio, Azure Bot Framework SDK, Internet Storage Name Service, Defender for IoT, Edge (Chromium-based), Microsoft Office and Office Components, SharePoint Server, PowerShell, Remote Desktop Client, Windows Hyper-V, Windows Mobile

IoT 108
article thumbnail

Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft

Dark Reading

Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say.

Security 106
article thumbnail

FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

Security Affairs

While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI on a recent data breach suffered by an Oregon healthcare organization lead to the accidental revelation that the FBI believes that the HelloKitty ransomware gang (Five Hands) operates out of Ukraine. “Oregon Anesthesiology Group, P.C.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Malicious Exchange Server Module Hoovers Up Outlook Credentials

Threatpost

"Owowa" stealthily lurks on IIS servers, waiting to harvest successful logins when an Outlook Web Access (OWA) authentication request is made.

article thumbnail

Privacy and Safety Issues With Facebook's New 'Metaventure'

Dark Reading

With access to a user's 3D model and full-body digital tracking, attackers can recreate the perfect replica of a C-level executive to trick employees.

Privacy 96
article thumbnail

Google Warns That NSO Hacking Is On Par With Elite Spy Groups

WIRED Threat Level

ForcedEntry is “one of the most technically sophisticated exploits” Project Zero security researchers have ever seen.

Security 108
article thumbnail

Building an intelligent automation ecosystem in banking

CGI

This CGI blog post discusses the importance of building an intelligent automation ecosystem in banking.

111
111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Rise in API-Based Attacks Underscore Investments in New Tools

Dark Reading

Noname Security's Series C fundraising tips the startup to over $1 billion in valuation, a sign that organizations are beginning to look for API security tools and investor are looking for innovation in the space.

article thumbnail

Relentless Log4j Attacks Include State Actors, Possible Worm

Threatpost

More than 1.8 million attacks, against half of all corporate networks, have already launched to exploit Log4Shell.

article thumbnail

The Biggest Deepfake Abuse Site Is Growing in Disturbing Ways

WIRED Threat Level

A referral program and partner sites have spurred the spread of invasive, AI-generated “nude” images.

Privacy 98
article thumbnail

SAP Kicks Log4Shell Vulnerability Out of 20 Apps

Threatpost

SAP’s still feverishly working to patch another 12 apps vulnerable to the Log4Shell flaw, while its Patch Tuesday release includes 21 other fixes, some rated at 9.9 criticality.

IT 73
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Industry Voices: Laura Crumley on Being a Woman in Tech

HID Global

Industry Voices: Laura Crumley on Being a Woman in Tech. kelizondocowley. Wed, 12/15/2021 - 11:18.

98
article thumbnail

Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory

Dark Reading

The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support.

Risk 70
article thumbnail

One Trust introduces Environmental, Social, and Governance blog in 2021

IG Guru

Check out their blog here. The post One Trust introduces Environmental, Social, and Governance blog in 2021 appeared first on IG GURU.

article thumbnail

Meta Expands Bug-Bounty Program to Include Data Scraping

Dark Reading

Scraping bugs and scraped databases are two new areas of research for the company's bug-bounty and data-bounty programs.

87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Addressing the demand for qualified SAP SuccessFactors cloud practitioners

OpenText Information Management

Companies are increasingly leveraging the cloud to power modern work. Currently, the market for cloud computing is USD $371.4 billion and is expected to grow up to USD $832.1 billion by the year 2025, largely due to increased distributed work environments and the need for more flexible, secure applications. Many corporate leaders recognize the benefits … The post Addressing the demand for qualified SAP SuccessFactors cloud practitioners appeared first on OpenText Blogs.

Cloud 62
article thumbnail

What Are the Pros and Cons of a SASE Architecture?

Dark Reading

SASE is a promising and burgeoning networking architecture approach, but it's not without some challenges.

IT 83
article thumbnail

log4jmemes.com

Roger's Information Security

[link] made me laugh, so I made my own meme. not particularly clever, probably many others have used the same template. But hadn’t seen any at the time i made this one. The post log4jmemes.com appeared first on Roger's Information Security Blog.

article thumbnail

Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft

Dark Reading

Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.

Risk 87
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Update on Micro Focus Response to “Log4j” Vulnerability

Micro Focus

December 15, 2021 Updates: Micro Focus is taking immediate action regarding Common Vulnerabilities and Exposures CVE-2021-44228 and CVE-2021-45046. CVE-2021-44228 Micro Focus is aware of the new guidance from Apache on the Apache Log4j vulnerability described in CVE-2021-44228 relating to newly discovered attack vectors. We are evaluating the impact on each of Micro Focus’ products in.

52
article thumbnail

Why Cloud Storage Isn't Immune to Ransomware

Dark Reading

Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management.

Cloud 84
article thumbnail

The Role of the COO: Have Your Hiring Practices Kept Up?

Adapture

The Role of the COO: Have Your Hiring Practices Kept Up? The Chief Operating Officer has long remained a common fixture on the org chart for companies along with CEOs and board of directors. The CEO was often considered the liaison to the board and developed the vision for the company, while the COO worked to execute that vision. Traditionally, the Chief Operating Officer was the second-in-command to the CEO.

Sales 52