Mon.Nov 27, 2023

article thumbnail

US, UK Cyber Agencies Spearhead Global AI Security Guidance

Data Breach Today

Global Cybersecurity Agencies Say 'Secure by Design' Is Key to AI Threat Mitigation Nearly two dozen national cybersecurity organizations on Sunday urged AI developers to embrace "secure by design" and other preventive measures aimed at keeping hackers out from the mushrooming world of AI systems. The United Kingdom and United States spearheaded its development.

Security 314
article thumbnail

You Don’t Need to Turn Off Apple’s NameDrop Feature in iOS 17

WIRED Threat Level

Yes, your iPhone automatically turns on NameDrop with the latest software update. But you shouldn’t really be worried about it—regardless of what the police are saying.

IT 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Udderly Insecure: Researchers Spot Cow-Tracking Collar Flaws

Data Breach Today

IoT Hackers Could Inject Data to Fool 'Smart' Farmers and Vets About Animal Welfare Not even dairy cows appear to be safe from internet of things flaws, researchers report after reverse-engineering health-monitoring collars for cows and finding they could eavesdrop on and alter data. Once addressed by the manufacturer, they said the non-updateable collars would have to be replaced.

IoT 312
article thumbnail

Section 702 Surveillance Reauthorization May Get Slipped Into ‘Must-Pass’ NDAA

WIRED Threat Level

Congressional leaders are discussing ways to reauthorize Section 702 surveillance, including by attaching it to the National Defense Authorization Act, Capitol Hill sources tell WIRED.

IT 122
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How Biden's AI Executive Order Will Affect Healthcare

Data Breach Today

President Joe Biden's recent executive order for artificial intelligence encourages investment in AI while setting a vision for a regulatory framework to address issues involving AI technology safety, bias and other concerns in healthcare, said attorney Wendell Bartnick of the law firm Reed Smith.

More Trending

article thumbnail

Welltok's MOVEit Hack Affects Nearly 8.5 Million, So Far

Data Breach Today

About 2 Dozen Welltok Health Plan Clients Affected in File Transfer Software Hack The tally of individuals whose health data was compromised in a hack on MOVEit file transfer software used by Welltok, a provider of online wellness resources to dozens of health plans, has soared to nearly 8.5 million. The hack is among the biggest health data breaches reported so far this year.

article thumbnail

Secret White House Warrantless Surveillance Program

Schneier on Security

There seems to be no end to warrantless surveillance : According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected of any crime, including victims.

Mining 114
article thumbnail

Hospital Chain Hit With Ransomware Attack

Data Breach Today

Ardent Health Services Operates 30 Hospitals, 200 Other Care Facilities in 6 States Tennessee-based Ardent Health Services, which operates dozens of hospitals and other healthcare facilities in several states, said on Monday that it is dealing with a ransomware attack that has forced the entity to divert some patients and cancel or reschedule certain procedures.

article thumbnail

Ukraine’s intelligence service hacked Russia’s Federal Air Transport Agency, Rosaviatsia

Security Affairs

Ukraine’s intelligence service announced the hack of the Russian Federal Air Transport Agency, ‘Rosaviatsia.’ Ukraine’s intelligence service announced they have hacked Russia’s Federal Air Transport Agency, ‘Rosaviatsia.’ The attack is the result of a complex special cyber operation. “The Defence Intelligence of Ukraine informs that as a result of a successful complex special operation in cyberspace, a large volume of confidential documents of the

Military 112
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Generative AI Will Reshape the Financial Services Sector

Data Breach Today

Wipro Americas 2 CEO Suzanne Dann on How Generative AI Can Address Risk, Compliance Generative AI can improve operational efficiencies, enhance risk and compliance and elevate the client experience for financial services firms, said Wipro's Suzanne Dann. Wipro embraced generative AI to reduce fraud by spotting anomalous behavior and used synthetic data to test deep learning models.

article thumbnail

Initial Access Broker Activity Doubles in One Year’s Time

KnowBe4

New data sheds light on just how active the Initial Access Broker (IAB) business is, and the growth uncovered doesn’t bode well for potential victim organizations.

Access 115
article thumbnail

Zscaler Taps Generative AI to Measure Risk, Predict Breaches

Data Breach Today

Zscaler Brings Generative AI to Data Protection Bundles, Debuts Standalone AI Tools Zscaler infused generative AI features into its data protection bundles and is introducing AI-powered products that quantify risk and predict breaches, said CEO Jay Chaudhry. The cloud security firm enhanced its data protection policies for AI/ML apps and tools to lower the likelihood of data loss.

Risk 262
article thumbnail

General Electric, DARPA Hack Claims Raise National Security Concerns

Dark Reading

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

Sales 122
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Harnessing AIOps for IT Operations and Management

Data Breach Today

Gartner's Padraig Byrne on Data Challenges and Operational Excellence IT leaders are poised to employ AIOps to combat the challenges faced by ITOps teams due to vast data volumes, alert fatigue and task prioritization. AIOps can potentially revolutionize IT operations, streamline alert management, and enhance overall reliability by combining AI and ML.

IT 214
article thumbnail

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Dark Reading

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

Privacy 97
article thumbnail

Huntress Finds Business Email Compromise (BEC) Increases In Q3, 2024

KnowBe4

Huntress has released a report finding that business email compromise (BEC) attacks have risen in the third quarter of 2023.

article thumbnail

How better key management can close cloud security gaps troubling US government (Part 1 of 2)

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government (Part 1 of 2) sparsh Tue, 11/28/2023 - 05:20 Bruce Schneier recently blogged : A bunch of networks, including US Government networks , have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key.

Cloud 78
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Cyber Threats to Watch Out for in 2024

Dark Reading

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key.

Cloud 83
article thumbnail

IBM watsonx AI and data platform, security solutions and consulting services for generative AI to be showcased at AWS re:Invent

IBM Big Data Hub

According to a Gartner® report , “By 2026, more than 80% of enterprises will have used generative AI APIs or models, and/or deployed GenAI-enabled applications in production environments, up from less than 5% in 2023.”* However, to be successful they need the flexibility to run it on their existing cloud environments. That’s why we continue expanding the IBM and AWS collaboration, providing clients flexibility to build and govern their AI projects using the watsonx AI and

Cloud 79
article thumbnail

CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines

Dark Reading

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

article thumbnail

UK and U.S. Develop Global Guidelines for AI Security

Hunton Privacy

On November 27, 2023, the UK government announced the first global guidelines to ensure the secure development of AI technology (the “Guidelines”), which were developed by the UK National Cyber Security Centre (“NCSC”) and the U.S. Cybersecurity and Infrastructure Security Agency (“CISA”), in cooperation with industry experts and other international agencies and ministries.

article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

Ardent Health Hospitals Disrupted After Ransomware Attack

Dark Reading

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

article thumbnail

UK and Republic of Korea Issue Warning about DPRK State-Linked Cyber Actors

Hunton Privacy

On November 23, 2023, the UK government’s National Cyber Security Centre (“NCSC”) and the Republic of Korea’s National Intelligence Service (“NIS”) issued a joint advisory detailing techniques and tactics used by cyber actors linked to the Democratic People’s Republic of Korea (“DPRK”) that are carrying out software supply chain attacks. The publication follows the recent announcement of a new Strategic Cyber Partnership between the UK and the Republic of Korea where the two nations have committ

Access 59
article thumbnail

Balancing Simplicity and Security in the Digital Experience

Dark Reading

New data shows consumer preferences for security in digital experiences and indicates ways businesses can best protect digital identity in today's digital world.

article thumbnail

Blazor State Management: Best Practices To Consider

Enterprise Software Blog

When we talk about Blazor, state is an essential part of any app that you build with a framework that includes user interaction. Consider a scenario where a user must log in to view sensitive data. However, because the state is not properly managed, they must log in again and again each time they reload the page. How likely are they to continue using the application in the future?

article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

HHS’ Office for Civil Rights Settles HIPAA Investigation of St. Joseph’s Medical Center for Disclosure of Patients’ Protected Health Information to a News Reporter

IG Guru

U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights November 20, 2023 HHS’ Office for Civil Rights Settles HIPAA Investigation of St. Joseph’s Medical Center for Disclosure of Patients’ Protected Health Information to a News Reporter St. Joseph’s Medical Center provided a national media outlet access to COVID-19 patients’ protected health information Today, […] The post HHS’ Office for Civil Rights Settles HIPAA Investigation of St.

Access 76
article thumbnail

Angular 17 Control Flow: Elevate Your Development Experience

Enterprise Software Blog

I'm excited to share that you can enhance your Angular development experience within Ignite UI for Angular components by embracing the new block template syntax for optimized, built-in control flow. This powerful feature simplifies your code, improves type checking, reduces bundle size, and boosts performance. So now, let's dive into some code samples to see the syntax in action!

article thumbnail

Drive efficiency in manufacturing with mobile technology for deskless workers.

Jamf

Innovative manufacturers are empowering workers with mobile technology, one of the ways to boost productivity in your deskless workforce. To better understand the roadmap to success, Jamf insiders share what manufacturers need to think about when they introduce mobile devices to their employees.