Tue.Jul 21, 2020

article thumbnail

DOJ: Chinese Hackers Targeted COVID-19 Vaccine Research

Data Breach Today

2 Indicted for Theft of a Broad Range of Intellectual Property in US and Elsewhere The U.S. Department of Justice has charged two Chinese nationals with hacking into the systems of hundreds of organizations in the U.S. and abroad. The suspects' activities allegedly included probing for vulnerabilities in systems at companies developing COVID-19 vaccines, treatments and testing tech.

330
330
article thumbnail

The Pros and Cons of Automating Human Resources

AIIM

In their efforts to streamline key business processes, industry leaders have looked to artificial intelligence (AI) and automation. Automation has forced multiple industries to rethink how they work and function ?— and human resources is one field where automation proves its worth. However, automation is not a be-all end-all solution to HR woes. While it fills in the gaps where humans fail to deliver, automation has its disadvantages, too.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISO Notebook: Putting Frameworks Around Risk

Data Breach Today

Dallas County CISO Michael Anderson on Risk Management and Resiliency Dallas County, one of the 10 largest counties in the U.S., was accustomed to an entirely on-premises workforce. Then came the pandemic. The Texas county's CISO, Michael Anderson, tells how he planned for business resiliency - and why he owes it all to frameworks.

Risk 221
article thumbnail

Lending Privilege – how can we do more to lift one another up and create a more inclusive workplace?

Micro Focus

The story continues Our INSPIRE podcast journey just keeps on getting better. Hot on the heels of our podcast with June Manley, founder of F4, I am super excited to introduce podcast number four in our INSPIRE series with Anjuan Simmons. Anjuan has been in the enterprise software space for over 20 years, and is currently an engineering. View Article.

124
124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK 'Failed' to Probe Threat of Russian Election Interference

Data Breach Today

Parliament Panel's Report Slams Government for Not Investigating Russian Activities The British government was underprepared for Russia's alleged attempts to influence the outcomes of the Brexit referendum in 2016 and the 2017 general election and failed to conduct adequate investigations, according to a report by the U.K. Parliament's Intelligence and Security Committee.

More Trending

article thumbnail

Will Banks Be Custodians of Identity?

Data Breach Today

David Birch of Consult Hyperion on the Transition From Protecting Deposits to Protecting Data Which entities will be custodians of our identities? David Birch of Consult Hyperion discusses why banks could be likely candidates for this emerging role.

179
179
article thumbnail

It’s time to get REALLY serious about digital transformation

OpenText Information Management

With the sudden explosion of remote work, the disruption to global supply chains, dramatic shifts in consumer behavior, and escalating cyber security threats, organizations have had to fast-track their digital transformation plans. In fact, a recent survey of 137 IT managers found that 73% expect to either accelerate or maintain digital transformation initiatives through the … The post It’s time to get REALLY serious about digital transformation appeared first on OpenText Blogs.

article thumbnail

BadPower attack could burn your device through fast charging

Security Affairs

Researchers devised a technique dubbed BadPower to alter the firmware of fast chargers to cause damage to connected systems or cause the device to catch fire. Security researchers from Tencent have devised a technique, dubbed BadPower, to alter the firmware of fast chargers to cause damage to connected systems or cause the device to catch fire. “Tencent Security Xuanwu Lab discovered a new type of safety problem in some fast charging (hereinafter referred to as fast charging) products and

article thumbnail

Diebold ATM Terminals Jackpotted Using Machine’s Own Software

Threatpost

The company warned that cybercriminals are using a black box with proprietary code in attacks to illegally dispense cash across Europe.

121
121
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ireland: Irish Court of Appeal Clarifies Boundaries of Concept of Personal Data

DLA Piper Privacy Matters

Summary. The Irish Court of Appeal has clarified the scope of the definition of personal data – noting that, while the definition is deliberately very broad, it does not facilitate access by an individual to reports stemming from a complaint for the sole reason that the complaint was made by that individual. On 1 July 2020, the Court of Appeal issued a judgment in the case Nowak v Data Protection Commissioner.

article thumbnail

Improving Records Disposition in Microsoft 365

Gimmal

I recently wrote an article about how we improve retention labels in Microsoft 365 (M365) and wanted to continue on the topic of improving the ever growing Microsoft platform. This post will discuss records disposition with M365 and how Gimmal improves on that.

article thumbnail

The History of Backup Tape Rotation & Vaulting

Record Nations

Overtime, there have been many developments in the capabilities in technology. Even today, there are constant changes in what technology is coming out as well as pushing the limits of what is possible. The same goes for backup tape storage. The storage capacity and capabilities of tapes have changed over the years, and continues to […]. The post The History of Backup Tape Rotation & Vaulting appeared first on Record Nations.

100
100
article thumbnail

Critical Adobe Photoshop Flaws Patched in Emergency Update

Threatpost

Adobe issued out-of-band patches for critical flaws tied to 12 CVEs in Photoshop and other applications.

Security 114
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing campaign aimed at stealing Office 365 logins abuses Google Cloud Services

Security Affairs

Cybercriminals are increasingly leveraging public cloud services such as Google Cloud Services in phishing campaigns against Office 365 users. Cybercriminals are increasingly abusing cloud services, such as Google Cloud Services, to arrange phishing campaign aimed at stealing Office 365 logins. Fraudsters use to host phishing pages on multiple cloud services and trick victims into landing on them.

article thumbnail

Chris Vickery: AI Will Drive Tomorrow’s Data Breaches

Threatpost

Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.

article thumbnail

4 key areas for successful information management transformation

OpenText Information Management

Enterprise technology and digital transformation programs are notoriously challenging. A recent Harvard Business Review (HBR) article stated: “Success requires bringing together and coordinating (a) far greater range of effort than most leaders appreciate…More than anything else, digital transformation requires talent…Of course, even the best talent does not guarantee success.

article thumbnail

DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records

Dark Reading

China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.

120
120
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacking a Power Supply

Schneier on Security

This hack targets the firmware on modern power supplies. (Yes, power supplies are also computers.). Normally, when a phone is connected to a power brick with support for fast charging, the phone and the power adapter communicate with each other to determine the proper amount of electricity that can be sent to the phone without damaging the device­ -- the more juice the power adapter can send, the faster it can charge the phone.

Paper 108
article thumbnail

US DoJ charges Chinese hackers for targeting COVID-19 research

Security Affairs

US Justice Department accused two Chinese hackers of stealing trade secrets from companies worldwide and targeting firms developing a COVID-19 vaccine. This week, the US Justice Department accused two Chinese hackers of stealing trade secrets from companies worldwide and recently involved in attacks against firms developing a vaccine for the COVID-19.

article thumbnail

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

WIRED Threat Level

From defense contractors to videogame companies, the indictment details an astonishing array of victims.

article thumbnail

Cloud computing provider Blackbaud paid a ransom after data breach

Security Affairs

Cloud software provider Blackbaud revealed to have paid crooks to decrypt its data following a ransomware attack that took place in May 2020. Blackbaud is a cloud computing provider that serves the social good community — nonprofits, foundations, corporations, education institutions, healthcare organizations, religious organizations, and individual change agents.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Connected Workspaces: A more effective way for dispersed teams to work

OpenText Information Management

We are currently living through very turbulent times. The new environment has most certainly impacted your teams, and impacted their productivity and efficiency. With all the disruption to our work habits, you may be looking for a more effective way for dispersed teams to manage content-centric work. OpenText™ Connected Workspaces, an OpenText™ Content Suite Platform … The post Connected Workspaces: A more effective way for dispersed teams to work appeared first on OpenText Blogs.

article thumbnail

Social Virtual Reality: An Alternative to web conferencing while ‘taking care of business’ remotely through the COVID crisis and beyond!

IG Guru

by Dr. Patricia C. Franks, San Jose State University’s iSchool Introduction Although some of us have worked 100% online for years, others were forced into doing the same by the recent (and on-going) Coronavirus pandemic. Many employees, who had fortunately already enjoyed internet connectivity for use with personal devices, found one of their biggest challenges […].

article thumbnail

Adobe fixed critical code execution flaws in Bridge, Photoshop and Prelude products

Security Affairs

This week, Adobe has addressed several critical code execution vulnerabilities in its Bridge, Photoshop and Prelude products. Adobe has released security updates to address several critical code execution vulnerabilities in its Bridge, Photoshop and Prelude products. “Adobe has published security bulletins for Adobe Bridge ( APSB20-44 ), Adobe Photoshop ( APSB20-45 ), Adobe Prelude ( APSB20-46 ) and Adobe Reader Mobile ( APSB20-50 ).

Cloud 67
article thumbnail

The Data Privacy Loophole Federal Agencies Are Still Missing

Dark Reading

Why knowledge-based authentication is leaving federal contact centers vulnerable to an increasingly sophisticated hacker community.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Webcast – Covid-19: Contact Tracing, Data Privacy and Public Trust

DLA Piper Privacy Matters

As the world moves into the next phase of the fight against Covid-19, governments are loosening lockdown measures and assessing strategies intended to contain new spikes and control the rate of infection. Contact tracing has been touted as a potential game-changer, with several countries around the world releasing apps that alert those who have come into close proximity with someone who has tested positive for Covid-19.

article thumbnail

Emotet Returns in Malspam Attacks Dropping TrickBot, QakBot

Threatpost

Emotet has resurfaced after a five-month hiatus, with more than 250,000 malspam messages being sent to email recipients worldwide.

78
article thumbnail

Microsoft 365 Updated with New Security, Risk, Compliance Tools

Dark Reading

Updates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.

Risk 78