Fri.Apr 06, 2018

article thumbnail

Breaches Tied to Chat Network Provider

Data Breach Today

Delta, Sears, Kmart and Best Buy Breaches All Stem From Hack of Same Vendor A spate of payment card breaches at some of the most recognized U.S. brands has been blamed on the hacking of India-based chat network provider [24]7.ai that led to the infiltration of online chat portals for Delta, Sears, Best Buy, Kmart and perhaps others.

177
177
article thumbnail

BS 31111: the new cyber security standard explained

IT Governance

Last month, a new British Standard was launched. BS 31111 is suitable for organisations of any type and size, and provides essential guidance for executive management to manage their cyber risk and resilience. Best-practice framework to implement a cyber security regime. Cyber security is often managed solely by IT departments but, to be truly successful, risks need to be addressed by the wider organisation – particularly executive management, who have a key role to play.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 4 Pitfalls of Privileged Access Management

Data Breach Today

Bomgar's Sam Elliott on Overlooked Areas of Security Overlooked areas of security and defense include four pitfalls of privileged access management, says Sam Elliott of Bomgar, who offers insights on taking the right steps.

Access 125
article thumbnail

DC's Stingray Mess Won't Get Cleaned Up

WIRED Threat Level

DHS this week confirmed that Washington, DC is littered with fake cell tower surveillance devices, but nothing will likely be done to fix it.

IT 86
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IBM Highlights Growth in Cryptocurrency-Based Cyberattacks

Data Breach Today

Leading the latest edition of the ISMG Security Report: Assessing cryptocurrencies' role in the latest ransomware and malware attacks. Plus: Facebook's revised estimate on account details accessed by Cambridge Analytica.

More Trending

article thumbnail

Ex-FBI Analyst Turns to Fighting Fraud

Data Breach Today

Citi's Alexis Castellani on New Role in Cyber Fraud Prevention Alexis Castellani spent a decade with the FBI, focused primarily on counter-terrorism. Now she is bringing some of these same skills to bear in her role as a cyber fraud prevention executive at Citi. What insights can she share on fraudsters and their schemes?

100
100
article thumbnail

Facebook Messenger's 'Unsend' Feature Is What Happens When You Scramble

WIRED Threat Level

It's good that Facebook is addressing its many privacy woes, but reacting rather than planning leaves some fixes feeling half-baked.

Privacy 80
article thumbnail

Mitigating Risks From Open Source and Third-Party Code

Data Breach Today

CA Veracode's Chris Eng on New Strategies to Bolster Application Security Organizations are developing new apps at the speed of business. But through the use of vulnerable code, they also are creating new risks just as fast. Chris Eng of CA Veracode offers new strategies and solutions to mitigate open source and third-party risks.

Risk 100
article thumbnail

The disposition of ISIS records

The Schedule

The New York Times just broke a story by investigative journalist Rukmini Callimachi titled “The ISIS files” exploring the way in which records kept by ISIS in Mosul reveal its efforts to build bureaucracy. ISIS demanded that Iraqi government workers continue to report to their offices. This allowed ISIS to take over existing state infrastructure, instead of having to invent it from the ground up.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Come to ARMA Houston's 2018 Spring Conference and be a records management hero!

Gimmal

Gimmal is proud to be exhibiting at ARMA Houston's 2018 Spring Conference. This year, we're empowering records managers across the U.S. to reach their information management potential and be the heroes their organizations deserve.

article thumbnail

Cyberinsurance Tries to Tackle the Unpredictable World of Hacks

WIRED Threat Level

Insuring against hacks and breaches can be a lucrative business—but also presents unique challenges.

article thumbnail

Weekly podcast: Panera Bread, Grindr and MyFitnessPal

IT Governance

This week, we discuss responses to data breaches at Panera Bread, Grindr and Under Armour’s MyFitnessPal. Hello and welcome to the IT Governance podcast for Friday, 6 April 2018. This week we’re going to concentrate on data breaches and incident response management. The security researcher Dylan Houlihan reports that the US bakery-café chain Panera Bread leaked customer information in plaintext – including “the full name, home address, email address, food/dietary preferences, username, pho

article thumbnail

Mirai Variant Targets Financial Sector With IoT DDoS Attacks

Threatpost

Researchers said a Mirai botnet variant, possibly linked to the IoTroop or Reaper botnet, was leveraged in attacks against the financial sector.

IoT 60
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIPL Issues Factsheet on Key Issues Relating to the Relationship Between the Proposed ePrivacy Regulation and the GDPR

Hunton Privacy

On March 20, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP issued a factsheet outlining relevant GDPR provisions for negotiations surrounding the proposed ePrivacy Regulation (the “Factsheet”). The Factsheet is designed for policymakers and other stakeholders involved in the development process of the new ePrivacy Regulation who are not deeply familiar with the GDPR.

GDPR 53
article thumbnail

Weekly Update 81 (Hawaii Edition)

Troy Hunt

We're in Hawaii! "We" being Scott Helme and myself and we're here for the Loco Moco Sec conference which has been a heap of fun (the location may have played a part in that.) And what a location: Scott joined me for this week's update and we were fresh out of a great talk from the Google Chrome Security PM so have a bit to share there about changes coming to the browser.

Risk 52
article thumbnail

Canada Will Require Breach Notification November 1

Hunton Privacy

The Canadian government recently published a cabinet order stating that the effective date for breach notification provisions in the Digital Privacy Act would be November 1, 2018. At that time, businesses that experience a “breach of security safeguards” would be required to notify affected individuals, as well as the Privacy Commissioner and any other organization or government institution that might be able to reduce the risk of harm resulting from the breach.

Privacy 53
article thumbnail

Use the GDPR to jump-start data governance initiatives

Information Management Resources

In preparing for the new EU mandate, organizations can simultaneously meet the growing security issues brought about by the proliferation of data and new technology.

GDPR 59
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Optimism and Opportunity in Life Sciences: Thinking back and looking forward

OpenText Information Management

Never have those words rung as true as today. Constant, ever-accelerating change has become the new normal in every walk of life. For Life Sciences companies, significant changes are impacting every level of business, from the marketplace to digital technology to regulatory requirements to uncertain political environments. Just over one year ago, change arrived in … The post Optimism and Opportunity in Life Sciences: Thinking back and looking forward appeared first on OpenText Blogs.

article thumbnail

Privacy Advocates Blast Facebook After Data Scraping Scandal

Threatpost

Privacy advocates are up in arms after Facebook CEO Mark Zuckerberg said most of the two billion users of the social network may have had their data scraped by malicious actors using a reverse search tool.

Privacy 49
article thumbnail

Businesses Fear 'Catastrophic Consequences' of Unsecured IoT

Dark Reading

Only 29% of respondents in a new IoT security survey say they actively monitor the risk of connected devices used by third parties.

IoT 56
article thumbnail

File Storage Facilities: What You Need to Know

Archive Document Data Storage

As you consider your choices for where and how you store your business files, try to imagine the legal and financial consequences of having your confidential information stolen, mismanaged or damaged. In this blog post, we discuss what you need to know about file storage facilities that will help you protect your business. Quality Counts. Warehouses and self-storage units aren’t ideal for storing business files.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

10 ways CDOs can turn data insights into actions

Information Management Resources

Analytics skills are in short supply, but demands for data-driven results are not. Here are Forrester’s top tips on how chief data officers can drive business strategy.

article thumbnail

Is customer engagement the answer to the ‘existential threat’ facing Utility companies?

OpenText Information Management

Enhanced customer engagement was shown to be the top outcome that UK Utility companies looked for from their digital transformation initiatives. That’s according to research that has just been completed by Utility Week and OpenText™. This blog looks at the reason that customer engagement is so important for the industry and whether a fresh perspective … The post Is customer engagement the answer to the ‘existential threat’ facing Utility companies?

article thumbnail

Study Finds Petabytes of Sensitive Data Open to the Internet

Dark Reading

New research by Digital Shadows finds more than 1.5 billion sensitive files are open to discovery on the internet.

51
article thumbnail

Building Fort Sumter

Unwritten Record

Fort Sumter will forever go down in history as the location of the opening shots of the Civil War on April 12, 1861. The Cartographic Branch holds architectural plans and drawings associated with the construction of forts throughout our nation’s history. This includes numerous plans relating to Fort Sumter’s lengthy construction. Today we are featuring a sampling of these plans, which are held within R ecord Group (RG) 77, Fortifications Map File.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Stripping the Attacker Naked

Dark Reading

How cyber threat intelligence can help you gain a better understanding of the enemy and why that gives security teams the upper hand.

article thumbnail

CloudNine Highlighted in G2 Crowd’s Spring 2018 Grid Report for eDiscovery

eDiscovery Daily

Leading Business Solution Review Platform Recognizes CloudNine for eDiscovery Excellence. CloudNine, a leader in simplifying and automating legal discovery, today announced its CloudNine eDiscovery Platform has been identified as one of the best eDiscovery software solutions based on its high levels of customer satisfaction and likeliness to recommend ratings from real users on G2 Crowd, the world’s leading business solutions review website. “It is a great honor to be highlighted by our u

IT 37
article thumbnail

Protect Yourself from Online Fraud This Tax Season

Dark Reading

Use these tips to stay safe online during everyone's least-favorite time of the year.

46