Thu.Feb 13, 2020

article thumbnail

FBI: BEC Losses Totaled $1.7 Billion in 2019

Data Breach Today

Business Email Compromises Accounted for Nearly Half of Cybercrime Losses Last Year Cybercrime led to $3.5 billion in losses in the U.S. last year, with a sharp uptick in business email compromise scams - which accounted for nearly half those losses, according to a newly released FBI Internet Crime Report, which is based on complaints the FBI received.

324
324
article thumbnail

Data Governance and Metadata Management: You Can’t Have One Without the Other

erwin

When an organization’s data governance and metadata management programs work in harmony, then everything is easier. Data governance is a complex but critical practice. There’s always more data to handle, much of it unstructured; more data sources, like IoT, more points of integration, and more regulatory compliance requirements. Creating and sustaining an enterprise-wide view of and easy access to underlying metadata is also a tall order.

Metadata 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA 2020: The Show Must Go On

Data Breach Today

Coronavirus Will Not Alter Plans for Event in San Francisco While public health concerns over the spread of the coronavirus are leading to the cancellation of some international events, the RSA Conference 2020 will proceed as scheduled in San Francisco Feb. 24-28.

291
291
article thumbnail

Microsoft recommends Exchange admins to disable the SMBv1 protocol

Security Affairs

Microsoft is recommending administrators to disable the SMBv1 network communication protocol on Exchange servers to prevent malware attacks. Microsoft is urging administrators to disable the SMBv1 protocol on Exchange servers as a countermeasure against malware threats like TrickBot and Emotet. “To make sure that your Exchange organization is better protected against the latest threats (for example Emotet, TrickBot or WannaCry to name a few) we recommend disabling SMBv1 if it’s enabled on

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Has Evidence of Huawei Backdoor: Report

Data Breach Today

Chinese Firm Denies Allegations That It Can Access Networks As the U.S. ramps up pressure on its allies to ban equipment from Chinese manufacturer Huawei from their 5G networks, U.S. officials now say they have evidence that the firm has created a backdoor that allows it to access mobile phone networks around the world, the Wall Street Journal reports.

More Trending

article thumbnail

After Malware Attack, Doctor Network Has Widespread Outage

Data Breach Today

Electronic Health Records System Inaccessible Hundreds of pediatric healthcare providers in Massachusetts were still unable to access their electronic health record systems Thursday after a malware attack earlier this week on a large physician network affiliated with Boston Children's Hospital. What can others learn from the incident?

Access 248
article thumbnail

US officials claim Huawei Equipment has secret backdoor for spying

Security Affairs

Huawei can secretly tap into communications through the networking equipment, states a U.S. official , while White House urge allies to ban the Chinese giant. This week The Wall Street Journal reported that U.S. officials say Huawei can covertly access telecom networks where its equipment is installed. “U.S. officials say Huawei Technologies Co. can covertly access mobile-phone networks around the world through “back doors” designed for use by law enforcement, as Washington tries to persua

article thumbnail

Ransomware Hit a Florida Voting System in 2016

Data Breach Today

County Officials Reveal Details of the Attack Election officials in Palm Beach County, Florida, revealed this week that its voter registration system was hit by ransomware in the weeks leading up to the 2016 presidential election.

article thumbnail

Privacy Experts Skeptical of Proposed Data Protection Agency

Threatpost

A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government can get it right.

Privacy 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Services Provider to Government Left Database Exposed: Report

Data Breach Today

Researcher Says Exposed Granicus Database Could Have Made Websites Vulnerable One of the largest IT services providers for U.S. federal and local government agencies left a massive production database exposed to the internet, potentially allowing attackers to rewrite content on websites or plant malware, according to a security researcher.

article thumbnail

7 Tax Season Security Tips

Dark Reading

Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.

Security 114
article thumbnail

Make data protection training fun with our GDPR Challenge game

IT Governance

The e-learning industry is increasingly influenced by the concept of ‘gamification’. This is the application of competitive gaming in a learning environment. Thanks to our GDPR Challenge E-learning Game , you can now reap the benefits of gamification when training your staff on their data protection obligations. The idea behind the game is to make lessons more engaging than standard e-learning.

GDPR 91
article thumbnail

Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec

Dark Reading

What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?

Phishing 119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Voting App Flaws Could Have Let Hackers Manipulate Results

WIRED Threat Level

New research from MIT shows that the Voatz app appears to have some glaring security holes.

Security 127
article thumbnail

Critical WordPress Plugin Bug Afflicts 700K Sites

Threatpost

Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible.

GDPR 117
article thumbnail

5 top cyber hygiene tips to help organizations stay ahead of cyberthreats

Information Management Resources

Similar to how an individual would not go to the dentist only once their teeth began falling out, an organization should not wait until a breach to get serious about cybersecurity.

article thumbnail

Google: Efforts Against Bad Android Apps on Play Store Are Working

Threatpost

The tech giant acknowledged some achievements in efforts to bolster mobile app security but recognized more needs to be done.

Security 102
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Weekly Update 178

Troy Hunt

This week I'm at Microsoft Ignite "The Tour" in Sydney with Lars Klint. I've spent most of the last couple of days doing the "hallway track" (basically just wandering around and saying "hi" to people) and doing a bunch of meetings with folks here on cyber things. I didn't mention it in the video, but there was also the Azure User Group Wednesday night and a panel here at Ignite last night so definitely keeping busy.

IT 83
article thumbnail

600+ installs of WordPress Cookie Consent Plugin vulnerable to hack. Fix it now!

Security Affairs

Developers of the popular WordPress GDPR Cookie Consent plugin have addressed a critical bug that could potentially impact 700K users. Critical vulnerabilities in the WordPress GDPR Cookie Consent plugin could be exploited by potential attackers to delete and change the content of the sites and inject malicious JavaScript code due to improper access controls.

GDPR 79
article thumbnail

Forget Hacks. Ransomware, Phishing Are Election Year's Real Threats

Dark Reading

As we gear up for the voting season, let's put aside any links between foreign interference and voting machine security and focus on the actual risks threatening election security.

article thumbnail

Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019

Security Affairs

Google Play Protect now scans over 100 billion applications on Android devices every day, these amazing figures were disclosed by Google. In May 2017, Google introduced a security defense system called Google Play Protect to protect the devices running its mobile OS. Google aims at monitoring the behavior of the apps and the detection of the malicious ones once they have been installed on Android devices.

Privacy 79
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A US Data Protection Agency

Schneier on Security

The United States is one of the few democracies without some formal data protection agency, and we need one. Senator Gillibrand just proposed creating one.

115
115
article thumbnail

French CNIL Publishes Draft Guidance on Cookie Consent

Data Matters

On January 14, 2020, the French data protection authority, the CNIL, proposed a consultation on its draft recommendations on practical ways to collect website user consent for cookies and similar technologies (the “Recommendations”). The Recommendations follow the publication in July 2019 of updated guidance on cookies, including requirements for obtaining GDPR-standard consent, by various European data protection authorities, including the CNIL and the ICO (the latter guidance was reported by D

GDPR 68
article thumbnail

Puerto Rico Gov Hit By $2.6M Phishing Scam

Threatpost

A recent phishing scam targeted Puerto Rico’s Industrial Development Company.

Phishing 107
article thumbnail

Small Business Security: 5 Tips on How and Where to Start

Dark Reading

There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Three best practices for data governance programs, according to Gartner

Information Management Resources

With data analytics playing such a huge role in the success of businesses today, strong data governance has become more vital than ever.

article thumbnail

Police keeping drink-driver's DNA breached his rights, judges rule

The Guardian Data Protection

Strasbourg decision in Fergus Gaughran’s case is problem for police data storage UK police who indefinitely retained in their records the DNA profile of a man convicted of drink-driving breached his human rights, Strasbourg judges have ruled. The ruling by the European court of human rights (ECHR) over Fergus Gaughran’s claim presents a significant challenge for police data storage practices in the UK.

63
article thumbnail

The role of graph technology and the data supply chain for responsible AI

Information Management Resources

Artificial intelligence today is effective for specific, well-defined tasks, but it struggles with ambiguity which can lead to subpar or even disastrous results.