Fri.Dec 27, 2019

article thumbnail

Defensive Wish List for 2020: Faster Responses to Threats

Dark Reading

Security professionals recommend technology to detect attacks that have already infiltrated a network.

article thumbnail

Will the U.S. Get a Federal Privacy Law?

Data Breach Today

Some Legislative Experts Don't Expect Progress Soon Democrats and the Republicans introduced a number of proposed bills in 2019 designed to create a federal privacy law. But will Congress be able to achieve a compromise in 2020?

Privacy 173
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fostering a culture that encourages citizen software developers

Information Management Resources

To get a better idea of what some of the top challenges are to creating more citizen developers, Information Management spoke with Terry Simpson, technical evangelist at automation company Nintex.

39
article thumbnail

Ransomware at IT Services Provider Synoptek

Krebs on Security

Synoptek , a California business that provides cloud hosting and IT management services to more than a thousand customer nationwide, suffered a ransomware attack this week that has disrupted operations for many of its clients, according to sources. The company has reportedly paid a ransom demand in a bid to restore operations as quickly as possible.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Cybercom Considers Bold Election Security Moves: Report

Data Breach Today

Measures Could Include 'Limited Cyber Operation' Against Russians The U.S. Cyber Command is weighing several cyber strategies to counter Russian influence and interference during the 2020 presidential election, The Washington Post reports. The measures reportedly could include a 'limited cyber operation' against Russian targets.

Security 162

More Trending

article thumbnail

Ransomware Attackers May Lurk for Months, FBI Warns

Data Breach Today

LockerGoga and MegaCortex Gangs May First Ransack Networks for Sensitive Data Warning: Attackers wielding LockerGoga and MegaCortex ransomware have been hitting large corporate networks, sometimes first lingering for months. That's according to a new FBI flash alert, as reported by Bleeping Computer, which essentially tells would-be victims: Please, get your defenses in order now.

article thumbnail

Top cybersecurity Predictions for 2020

Security Affairs

The 2020 Cybersecurity Landscape – Below Pierluigi Paganini’s cybersecurity predictions for the next twelve months. Here we are again for the annual prediction of the events that I believe will impact the cybersecurity landscape in the next year. Let’s try to imagine what threats and bad actors will influence the cyber arena in the next 12 months. 1) Targeted ransomware attacks on the rise.

article thumbnail

Analysis: 2020 Cybersecurity Issues

Data Breach Today

The latest edition of the ISMG Security Report discusses 2020 cybersecurity trends, including fixing "fake everything," dealing with the issue of weaponized social media and securing the U.S. presidential election.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

A royal baby, a fire at Notre-Dame, the highest grossing film of all time and more than 12 billion breached data records: 2019 has been quite a year. IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Part one covers January to June, and will be followed by part in the coming days. January. Anyone doubting whether supervisory authorities would use the disciplinary measures imposed by the GPDR (General Data Protection Regulation) began the year with

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

More than 100 Chinese nationals arrested in Nepal over suspected cyber scam

Security Affairs

Nepal police arrested more than 100 Chinese nationals over a suspected cyber scam, this is the largest-ever operation involving foreigners. Nepal authorities have arrested more than 100 Chinese nationals that were in the country on tourist visas, they are suspected to be involved in a cyber scam. The Nepal police conducted a coordinated operation that allowed the arrests of the suspects, eight of which are women.

article thumbnail

Canada Signals Overhaul of Data Privacy

Hunton Privacy

Canadian Prime Minister Justin Trudeau has signaled his intent to overhaul data privacy within Canada. Prime Minister Trudeau recently sent a Mandate Letter to Navdeep Bains, the Minister of Innovation, Science and Industry, that contained a number of mandates with respect to data privacy. Specifically, the Mandate Letter states that Minister Bains is expected to work with the Minister of Justice, Attorney General of Canada and the Minister of Canadian Heritage to advance Canada’s Digital Charte

article thumbnail

Thai Officials confirmed the hack of prison surveillance cameras and the video broadcast

Security Affairs

Authorities in Thailand are investigating a cyber attack that resulted in the broadcast of surveillance video from inside a prison in the country’s south. Local media reported that hackers broke into the surveillance system at Lang Suan prison in the southern province of Chumphon, the video was broadcast live on YouTube for several hours. The video was published on Tuesday by an account named “ BigBrother’s Gaze,” the images from several cameras showed prisoners’ op

IoT 69
article thumbnail

Did you know? AMC Monthly Newsletter

Micro Focus

The year, and the decade, are winding down. What better time to update you on the exciting future events, webinars, and a really big survey? Welcome to the latest Application Modernization & Connectivity newsletter. Shape COBOL’s future COBOL is 60. You know that. But what about the next 60? Good question. To find out, we. View Article.

52
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Windows systems at Maastricht University were infected with a ransomware

Security Affairs

A new ransomware attack made the headlines, Maastricht University (UM) confirmed that the malware encrypted all its Windows systems on December 23. Maastricht University (UM) announced ransomware infected almost all of its Windows systems on Monday, December 23. Maastricht University is an excellent university attempted by over 18,000 students, roughly 4,400 employees, and 70,000 alumni. “Maastricht University (UM) has been hit by a serious cyber attack.

article thumbnail

Belgian DPA Releases Draft 2019-2025 Strategic Plan

Hunton Privacy

On December 12, 2019, the Belgian Data Protection Authority (the “Belgian DPA”) released its draft 2019-2025 Strategic Plan (the “Draft Plan”). In the Draft Plan, the Belgian DPA describes its vision for the years to come, defines its priorities and strategic objectives and lists the necessary means to achieve its objectives. The following are some of the key takeaways from the Draft Plan: The Belgian DPA will focus its actions on five sectors: (1) telecom and media, (2) public institutions, (3)

article thumbnail

NVIDIA patches CVE-2019-5702 high-severity flaw in GeForce Experience

Security Affairs

NVIDIA released a security update for the Windows NVIDIA GeForce Experience app that addresses CVE-2019-5702 high severity flaw. NVIDIA addresses a high severity vulnerability ( CVE-2019-5702) in Windows NVIDIA GeForce Experience (GFE) app that could be exploited by local attackers to trigger a denial of service ( DoS ) condition or escalate privileges on systems running the vulnerable software.

Risk 63
article thumbnail

Podcast: The Roadblocks and Opportunities For Women in Cybersecurity

Threatpost

Threatpost examines the challenges - and opportunities - that women are facing in the cybersecurity landscape.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Going beyond Analytics: The trends enabling the data mosaic in 2020

Information Management Resources

Turning a fragmented landscape into a real opportunity will mean using both synthesis and analysis, with active metadata as the fabric. We call this the data mosaic.

article thumbnail

Poll Results: Security Pros Are Not Only Smart -- They're Generous, Too

Dark Reading

Altruism is alive and well among Edge readers, who seek to share their security expertise with causes they care about.

article thumbnail

Google Chrome Affected By Magellan 2.0 Flaws

Threatpost

Researchers warn that five vulnerabilities that stem from SQLite could enable remote code execution.

article thumbnail

Gauging the Cybersecurity Climate

Dark Reading

Is climate change impacting your cybersecurity, cyber-risk, or cyber-incident response plans?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Data Subject Requests are at the heart of protecting privacy

Information Management Resources

Now that GDPR is in full force and privacy has become a major consumer and business issue, people are paying attention to the term – especially those who oversee privacy programs.

Privacy 39
article thumbnail

Two-Thirds of Security Pros Ready to or Already Volunteer Their Services

Dark Reading

Majority of survey respondents seek to share their security expertise with causes they care about.

article thumbnail

Infographic: Polygon shares interesting facts about document restoration

IG Guru

The post Infographic: Polygon shares interesting facts about document restoration appeared first on IG GURU.

article thumbnail

How Can My Security Team Begin Future-Proofing for Quantum Computing?

Dark Reading

Knowing where your digital certificates are is just the start.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Friday Squid Blogging: New Species of Bobtail Squid

Schneier on Security

Euprymna brenneri was discovered in the waters of Okinawa. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

article thumbnail

How Should My Security Department Begin Future-Proofing for Quantum Computing?

Dark Reading

Knowing where your digital certificates are is just the start.

article thumbnail

Too Much Holiday Cheer? Here’s Something to Fear: Cybersecurity Predictions for 2020

Adam Levin

2019 is virtually over and a new year beckons with all the solemnity of the grim reaper for those who don’t have their eyes wide open to the persistent threats we collectively face in the areas of privacy and cybersecurity. . Now that I have your attention, I’d like to add that it’s not all bad news. In the main, consumers and business leaders alike are more aware of cybersecurity and privacy than ever before.