Fri.May 24, 2019

article thumbnail

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises. Dan Fitzgerald, a CISO at the consultancy McKinsey & Co., shares insights on how to make these transitions.

Cloud 225
article thumbnail

Germany Talking about Banning End-to-End Encryption

Schneier on Security

Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, although the article doesn't say how. (Cory Doctorow has previously explained why this would be impossible.).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Moody's Changes Equifax's Outlook to 'Negative'

Data Breach Today

First Time a Data Breach Triggers a Moody's Financial Outlook Change Moody's has changed its financial outlook for Equifax to "negative" from "stable," reflecting concerns about how the credit reporting giant is recovering from the 2017 data breach that exposed the personal information of 148 million Americans.

article thumbnail

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google announced a glitch that stored unencrypted passwords belonging to several business customers, a situation that had been exploitable since 2005. In a blog post released this week, the company admitted the passwords of “some” of its G Suite customers had been stored on internal servers without cryptographic protection, also known as a hash. “This issue has been fixed and, again, we have seen no evidence of improper access to or misuse of the affected passwords.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Multilayered Security Gets Personal

Data Breach Today

First Data's Tim Horton on Why Encryption Is Not Enough to Secure PII When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption. But that approach no longer suffices, says First Data's Tim Horton, who calls for a new multilayered defense.

Security 188

More Trending

article thumbnail

Healthcare's Unique Digital Transformation

Data Breach Today

The term "digital transformation" is not just marketing buzz; it's the here and now for many organizations. And the healthcare sector is uniquely impacted, says Stuart Reed of Nominet in the wake of a recent roundtable discussion.

article thumbnail

7 Recent Wins Against Cybercrime

Dark Reading

The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.

98
article thumbnail

WannaCry Still Causing Tears 2 Years On

Data Breach Today

The latest edition of the ISMG Security Report assesses the legacy of WannaCry ransomware two years on. Also featured: the evolving role of healthcare CISOs; threat mitigation recommendations based on the 2019 Verizon Data Breach Investigations Report.

article thumbnail

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Security Affairs

Most of the digital certificates used to sign malware samples found on VirusTotal have been issued by the Certificate Authority (CA) Comodo CA. Most of the digital certificates used to sign malware samples found on VirusTotal in 2018 have been issued by the Certificate Authority (CA) Comodo CA (aka Sectigo ). Chronicle’s security researchers have analyzed submissions May 7, 2018, and May 7, 2019 discovering that out of a total of 3,815 signed malware samples, 1,775 were signed using a digital ce

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Instagram Bans Social Media Company After Data Exposure

Data Breach Today

Leak Contained Public Data From Instagram and Other Sources Instagram has revoked the access of an Indian social media marketing company after personal details of some of its users ended up in an unprotected database online. Instagram says the number of affected users - first reported at 49 million - is inaccurate, and the exposed data from Instagram was already public.

Marketing 168
article thumbnail

How Hackers Access Direct Deposit Paycheck — And What to Do About It

Security Affairs

Getting your paycheck deposited directly into your bank account seems like a handy solution but in some cases. hackers can access them. Getting your paycheck deposited directly into your bank account seems like a handy solution because you don’t have to pick up the check from your workplace and take it to the bank to deposit it. It works well in many cases but is not immune to hackers.

Access 92
article thumbnail

Medicare Fraud Conspiracy Included HIPAA Violations

Data Breach Today

Three Sentenced to Prison for Scheme That Targeted Seniors Three individuals have been sentenced to serve time in federal prison after pleading guilty to participating in a $1 million Medicare fraud conspiracy that included criminal HIPAA violations.

157
157
article thumbnail

Snapchat staff used internal tools to spy on users

Security Affairs

Snapchat internal staff has allegedly abused their role in the company to spy on Snapchat users using and internal tools and steal data. Snapchat is a multimedia messaging app that makes pictures, videos, and messages (snaps) available for a short time before they become inaccessible to their recipients. Initially, it was only allowing person-to-person photo sharing, but now it also implements users’ “Stories” of 24 hours of chronological content.

Access 90
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Executive Roundtable Recap: "Confessions of a Healthcare CISO"

Data Breach Today

ISMG and NTT hosted a roundtable dinner in Chicago on May 8 focused on "Confessions of a Healthcare CISO".

145
145
article thumbnail

How Security Vendors Can Address the Cybersecurity Talent Shortage

Dark Reading

The talent gap is too large for any one sector, and cybersecurity vendors have a big role to play in helping to close it.

article thumbnail

GitHub introduces new tools and security features to secure code

Security Affairs

GitHub announced the introduction of several new tools and security features to help developers secure their code. The popular code repository hosting service GitHub continues its efforts in helping its customers in developing and maintaining a secure code. “Ninety-nine percent of new software projects depend on open source code. This extensive code reuse helps everyone build better software faster than ever before, but it also puts us all at risk of distributing security vulnerabilities f

article thumbnail

NSA Hawaii

Schneier on Security

Recently I've heard Edward Snowden talk about his working at the NSA in Hawaii as being "under a pineapple field." CBS News recently ran a segment on that NSA listening post on Oahu. Not a whole lot of actual information. "We're in office building, in a pineapple field, on Oahu." And part of it is underground -- we see a tunnel. We didn't get to see any pineapples, though.

IT 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook says it took down 2.19 billion accounts in Q1 2019

Security Affairs

Social network giant Facebook revealed it recently disabled billions of accounts operated by “bad actors” and that five percent of active accounts are fake. The news is disconcerting, but sincerely not so surprising, Facebook announced it recently disabled billions of accounts operated by “bad actors” and that five percent of its active accounts are fake.

IT 81
article thumbnail

Joomla and WordPress Found Harboring Malicious Redirect Code

Threatpost

New.htaccess injector threat on Joomla and WordPress websites redirects to malicious websites.

Privacy 102
article thumbnail

US DoJ’s superseding indictment charges Assange with violating Espionage Act

Security Affairs

The United States Department of Justice charges WikiLeaks founder Julian Assange with 18 counts on the alleged violation of the Espionage Act. A federal grand jury returned an 18-count superseding indictment that charges WikiLeaks founder Julian Assange with counts related to illegally obtaining and disclosing classified information. British authorities arrested Assange on April 11 at the Ecuadorian Embassy in London after Ecuador withdrew asylum after seven years.

article thumbnail

Snapchat Privacy Blunder Piques Concerns About Insider Threats

Threatpost

After a report found that Snap employees were abusing their access to Snapchat data, experts are warning that insider threats will continue to be a top challenge for privacy.

Privacy 67
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New online gambling rules might increase the likelihood of data breaches

IT Governance

The UK introduced new rules intended to make online gambling safer earlier this month , but there are concerns that they have created additional information security risks. Under the new requirements, which came into effect on 7 May, anyone who registers for an online gambling site needs to provide proof of their age, name and address. However, this could be an extra incentive for cyber criminals to target gambling organisations, as the additional personal details alongside financial data is a p

article thumbnail

Master NSA-Grade Security Tools at New Black Hat Trainings Virginia

Dark Reading

Get ready, because this October Black Hat will bring its highly-regarded Trainings to Alexandria, Virginia for two days of intensive, practical cybersecurity education.

article thumbnail

FBI: Internet-fueled theft, fraud, and exploitation reaches cost of $2.7 billion

DXC Technology

The FBI’s Internet Crime Complaint Center (IC3) published its fifth annual Internet Crime Report last month. The report, based on information gleaned from 351,936 complaints of suspected Internet crime, found more than $2.7 billion in Internet-fueled theft, fraud and exploitation for 2018. According to the report, email scams wrought the highest level of financial losses […].

IT 61
article thumbnail

News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

Threatpost

The Threatpost team breaks down the top privacy-related data incidents of the week - including data leaks from HCL and a golfing app - and highlights some surprisingly good privacy news.

Privacy 60
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The EDPB Publishes Updated Enforcement Figures for the First Anniversary of the GDPR

Hunton Privacy

On May 22, 2019, the European Data Protection Board (the “EDPB”) published on its website a summary of enforcement actions taken by the European Economic Area Supervisory Authorities (“EEA Supervisory Authorities”) one year after the entry into force of the General Data Protection Regulation (the “GDPR”). Reflecting on the growing numbers of data controllers designating a lead supervisory authority, the EDPB reported that of the 446 cross-border cases opened by EEA Supervisory Authorities, 205 o

GDPR 58
article thumbnail

NSS Labs Admits Its Test of CrowdStrike Falcon Was 'Inaccurate'

Dark Reading

CrowdStrike, NSS Labs reach confidential settlement over 2017 endpoint product testing dispute.

IT 79
article thumbnail

Il futuro degli smartphone potrebbe essere nelle tue mani

DXC Technology

L’era degli smartphone ha i giorni contati, a causa della saturazione del mercato e della mancanza di significativi progressi tecnologici avvenuti negli ultimi anni ma è anche dovuto alla necessità dei produttori di evitare la mercificazione, fattore che li ha costretti ad abbattere i prezzi diminuendo drasticamente i margini di profitto.

54