Thu.Nov 07, 2019

article thumbnail

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits. Health industry experts say the findings should prompt a larger review of how security — or the lack thereof — may be impacting patient outcomes.

article thumbnail

Trend Micro Employee Sold Consumer Data to Scammers

Data Breach Today

Employee Has Been Fired; 68,000 Customers Affected A Trend Micro employee stole and then sold contact information for 68,000 of the company's consumer subscribers, which led to a raft of unsolicited tech support scam calls, the company says. The employee has been fired. The incident highlights the risk of insider threats.

Risk 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Where should information management live in the organization?

AIIM

I returned to downtown Washington, DC, last week to teach the AIIM Foundations of Intelligent Information Management (FIIM) course. The class started with some icebreaker exercises, including asking the students to define, in their own words, “ What is information management? ” There were some fantastic definitions generated from the students for this and other discussion questions throughout the course.

article thumbnail

Feds Allege Twitter Infiltrated by Saudi Spies

Data Breach Today

US Charges Two Ex-Employees and Saudi National With Spying on Twitter Users The U.S. Department of Justice has charged three men with perpetrating a campaign to infiltrate Twitter and spy on critics of the Saudi government. Two of the suspects formerly worked for Twitter, allegedly feeding details to Saudi handlers that could be used to identify and locate critics of the Saudi regime.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HSTS From Top to Bottom or GTFO

Troy Hunt

We're pretty much at a "secure by default" internet these days, at least that's the assumption with most websites, particularly so in the financial sector. About 80% of all web pages are loaded over an HTTPS connection , browsers are increasingly naggy when anything isn't HTTPS and it's never been cheaper nor easier to HTTPS all your things. Which meant that this rather surprised me: Let me break down what's happening here: I'm in (yet another) hotel and on complete autopilot, I start typing "xe

More Trending

article thumbnail

Why GDPR compliance requires a software solution

IT Governance

All organisations need help complying with the GDPR (General Data Protection Regulation). You might not be able to bring in expert consultants, but there are software packages to help with the majority of your compliance requirements, from risk assessments to data breach reporting. IT Governance’s CyberComply platform contains all the software solutions you need in one bundle.

GDPR 84
article thumbnail

Facebook: Developers Wrongfully Accessed User Data - Again

Data Breach Today

Company Acknowledges 100 Third-Party Developers Had Unauthorized Access Facebook has revealed that, once again, it allowed third-party app developers to wrongfully gain access to its customers' private data. The company changed access for about 100 developers after the problem was discovered.

Access 133
article thumbnail

Apple Business Manager adds federated authentication

Jamf

Apple Business Manager is one of the most powerful services available to IT admins deploying and managing Apple at scale, and recently it got even better with support for Microsoft Azure Active Directory (AD). Full details here.

article thumbnail

Why Is Third-Party Risk Management So Complex?

Data Breach Today

Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner.

Risk 113
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Apple Business Manager adds federated authentication

Jamf

Apple Business Manager is one of the most powerful services available to IT admins deploying and managing Apple at scale, and recently it got even better with support for Microsoft Azure Active Directory (AD). Full details here.

article thumbnail

4 File Sharing Security Risks to Avoid While Doing B2B File Sharing | OneHub

OneHub

More than 90% of American small businesses utilize cloud storage today. While not all are comfortable working within the cloud yet, more companies are turning to additional cloud services. However, many make the mistake of believing the cloud offers infinite protection. Cloud services offer a variety of security features. The majority of data breaches are caused by human error , but to avoid putting your data at risk, read through our top four file sharing security risks to avoid when taking par

B2B 68
article thumbnail

Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO

Dark Reading

The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification.

64
article thumbnail

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019

Security Affairs

Bug hunters have earned a total of $195,000 for finding flaws in TVs, routers and smartphones on the first day of the Pwn2Own Tokyo 2019 contest. Pwn2Own is the annual hacking contest event organized by Trend Micro’s Zero Day Initiative (ZDI). Pwn2Own Tokyo 2019 contest offers over $750,000 in rewards for working exploits targeting one of the devices in a list of 17 systems.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Our work matters: Collibrians give back

Collibra

At Collibra, we believe that our work matters. We strive to transform our company, our industry and the world. We recently embraced this core value by coming together to give back to our local communities through the GiveOne initiative. Collibrians across the globe joined together to feed the elderly, clean up parks, educate kids, restock food pantries and clean rivers (just to name a few). .

article thumbnail

How to Opt Out of the Sites That Sell Your Personal Data

WIRED Threat Level

It's much harder than it should be to get your name off of data broker and people-search sites, but it's possible. .

article thumbnail

SLRM Customer Service Survey

The Texas Record

As a valued customer who works for a state agency or local government, we invite you to rate our services in this biennial customer service survey. The survey covers records management assistance (consulting, training, and publications), records storage, and imaging for state agencies and local governments. Additionally, state agencies are asked about the State Records Center, the Imaging Services unit, TexLinx, and Billing and Contracting.

article thumbnail

Reminder: Comment on Universal Electronic Records Management Requirements by December 6, 2019

National Archives Records Express

As we announced in a previous post , we are requesting comments on the Universal Electronic Records Management Requirements as part of our Federal Electronic Records Modernization Initiative (FERMI). Please share widely so we can receive comments from a variety of stakeholders. We would like to receive all comments by Friday, December 6, 2019. If you have any questions, please leave a comment or email us at rmpolicy@nara.gov.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Austrian DPA Fines Österreichische Post AG 18 Million Euros

Hunton Privacy

The European Data Protection Board recently published on its website that the Austrian Data Protection Authority (“Austrian DPA”) imposed an €18 million fine (approximately $20 million) on the Austrian Postal Service, Österreichische Post AG (“ÖPAG”), for various violations of the EU General Data Protection Regulation (“GDPR”). After conducting an investigation, the Austrian DPA established that ÖPAG unlawfully processed and sold data with respect to its customers’ alleged political affinities.

GDPR 55
article thumbnail

Eavesdropping on SMS Messages inside Telco Networks

Schneier on Security

Fireeye reports on a Chinese-sponsored espionage effort to eavesdrop on text messages: FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft. Named MESSAGETAP, the tool was deployed by APT41 in a telecommunications network provider in support of Chinese espionage efforts.

article thumbnail

Data Breach Fines: Are They Working to Boost Consumer Safety?

Threatpost

Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise.

article thumbnail

Calculating ROI for RFID Asset Management

RFID Global Solution, Inc.

So you have a lot of valuable assets that you’re having trouble keeping track of. Maybe it’s the IT items in your data center that are constantly on the move. Perhaps it’s expensive lab equipment or tools that always seems to go missing. It could be returnable containers that don’t get returned or important files … Calculating ROI for RFID Asset Management Read More ».

IT 53
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Enfuse shines spotlight on AI, analytics and machine learning

OpenText Information Management

Can you imagine living today without a mobile phone or not using the internet? Well, we are rapidly approaching a time where you will feel the same thing about working without the benefits of artificial intelligence (AI). AI, Machine Learning and related technologies such as deep learning, are already revolutionizing work in business, the legal … The post Enfuse shines spotlight on AI, analytics and machine learning appeared first on OpenText Blogs.

article thumbnail

Majority of firms fail at fostering a data-driven culture

Information Management Resources

A large majority of organizations think data and analytics are important to their digital transformation and business growth, but most are not enabling a data-driven culture, says a new study.

article thumbnail

Amazon’s Ring Video Doorbell could open the door of your home to hackers

Security Affairs

Bitdefender discovered a high-severity security flaw in Amazon’s Ring Video Doorbell Pro devices that could allow nearby attackers to steal WiFi password. Amazon’s Ring Video Doorbell is a smart wireless home security doorbell camera that allows users to use to remotely control their doorbell. Amazon’s Ring Video Doorbell allows users to interact with anyone on their property from a remote location, it is connected to the WiFi network and could be remotely controlled from a sma

article thumbnail

Twitter & Trend Micro Fall Victim to Malicious Insiders

Dark Reading

The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data.

Access 54
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

OpenText Content Services named a leader in latest Gartner report

OpenText Information Management

OpenText is pleased to announce we have been named a Leader in Gartner’s 2019 Magic Quadrant for Content Services Platforms. “The cornerstone of the OpenText strategy is ensuring our customer’s information enables and informs their digital business. We are helping the world’s most complex organizations improve information security, governance, collaboration and analytics,” said Mark J. … The post OpenText Content Services named a leader in latest Gartner report appeared first on Open

article thumbnail

Two former Twitter employees charged of spying on Users for Saudi Arabian Government

Security Affairs

Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government. Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government. The two former Twitter employees operated for the Saudi Arabian government with the intent of unmasking dissidents using the social network.

article thumbnail

Be On The Lookout for E-Skimmers – Third Certainty #9

Adam Levin

On the latest episode of Third Certainty, Adam Levin explains the dangers of e-skimming, where malicious code is deployed to e-commerce sites to steal customer payment information. The post Be On The Lookout for E-Skimmers – Third Certainty #9 appeared first on Adam Levin.