Thu.Nov 07, 2019

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits.

Facebook: Developers Wrongfully Accessed User Data - Again

Data Breach Today

Company Acknowledges 100 Third-Party Developers Had Unauthorized Access Facebook has revealed that, once again, it allowed third-party app developers to wrongfully gain access to its customers' private data. The company changed access for about 100 developers after the problem was discovered

Access 130

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

A complaint unsealed by the Department of Justice on Thursday alleges a New York firm engineered a years-long scheme to deceive the U.S. government: selling Chinese manufactured cameras and other gear to the U.S.

Trend Micro Employee Sold Consumer Data to Scammers

Data Breach Today

Employee Has Been Fired; 68,000 Customers Affected A Trend Micro employee stole and then sold contact information for 68,000 of the company's consumer subscribers, which led to a raft of unsolicited tech support scam calls, the company says. The employee has been fired.

Risk 130

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Calculating ROI for RFID Asset Management

RFID Global Solution, Inc.

So you have a lot of valuable assets that you’re having trouble keeping track of. Maybe it’s the IT items in your data center that are constantly on the move. Perhaps it’s expensive lab equipment or tools that always seems to go missing.

IT 52

More Trending

Why Many People Got Mysterious Valentine’s Day Texts Today

WIRED Threat Level

The issue was reportedly caused by a maintenance update made to “messaging platforms of multiple carriers in the US.". Security

Feds Allege Twitter Infiltrated by Saudi Spies

Data Breach Today

US Charges Two Ex-Employees and Saudi National With Spying on Twitter Users The U.S. Department of Justice has charged three men with perpetrating a campaign to infiltrate Twitter and spy on critics of the Saudi government.

Amazon’s Ring Video Doorbell could open the door of your home to hackers

Security Affairs

Bitdefender discovered a high-severity security flaw in Amazon’s Ring Video Doorbell Pro devices that could allow nearby attackers to steal WiFi password.

Why Is Third-Party Risk Management So Complex?

Data Breach Today

Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner

Risk 100

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Predictive Model Ensembles: Pros and Cons

Perficient Data & Analytics

Many recent machine learning challenges winners are predictive model ensembles. We have seen this in the news. Data science challenges are hosted on many platforms. Techniques included decision trees, regression, and neural networks. And, winning ensembles used these in concert.

Enfuse shines spotlight on AI, analytics and machine learning

OpenText Information Management

Can you imagine living today without a mobile phone or not using the internet? Well, we are rapidly approaching a time where you will feel the same thing about working without the benefits of artificial intelligence (AI).

How to Opt Out of the Sites That Sell Your Personal Data

WIRED Threat Level

It's much harder than it should be to get your name off of data broker and people-search sites, but it's possible. . Security Security / Privacy

Specially Crafted ZIP archives allow bypassing secure email gateways

Security Affairs

Experts observed a new phishing campaign that used a specially crafted ZIP archive that was designed to bypass secure email gateways to distribute malware.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

OpenText Content Services named a leader in latest Gartner report

OpenText Information Management

OpenText is pleased to announce we have been named a Leader in Gartner’s 2019 Magic Quadrant for Content Services Platforms. The cornerstone of the OpenText strategy is ensuring our customer’s information enables and informs their digital business.

Summary – “Industry in One: Financial Services”

ARMA International

This article summarizes a report published by AIEF on June 26, 2019. Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November.

Two former Twitter employees charged of spying on Users for Saudi Arabian Government

Security Affairs

Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government. Two former Twitter employees have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government.

4 steps to prepare your workforce for the future

DXC Technology

What’s the best way to prepare for the workforce of the future? With news of Amazon, JPMorgan Chase, and others investing billions in training, you’d be forgiven for thinking the answer is simply “reskilling the workforce.” And yet, reskilling is only one part of the solution.


Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Eavesdropping on SMS Messages inside Telco Networks

Schneier on Security

Throwback article is a good reminder on how mobile devices are vulnerable via Citizen Lab

IG Guru

The Many Identifiers in Our Pockets. The post Throwback article is a good reminder on how mobile devices are vulnerable via Citizen Lab appeared first on IG GURU.

Trend Micro rogue employee sold customer data to tech support scammers

Security Affairs

A Trend Micro employee was spotted stealing consumer customer information and selling it to tech support scammers. TrendMicro confirmed that it has discovered one employee that was stealing consumer customer information and selling it to tech support scammers.

HSTS From Top to Bottom or GTFO

Troy Hunt

We're pretty much at a "secure by default" internet these days, at least that's the assumption with most websites, particularly so in the financial sector.

Bug Hunters Earn $195,000 for Hacking TVs, Routers, Phones at Pwn2Own Tokyo 2019

Security Affairs

Bug hunters have earned a total of $195,000 for finding flaws in TVs, routers and smartphones on the first day of the Pwn2Own Tokyo 2019 contest. Pwn2Own is the annual hacking contest event organized by Trend Micro’s Zero Day Initiative (ZDI).

IT 52

Be On The Lookout for E-Skimmers – Third Certainty #9

Adam Levin

On the latest episode of Third Certainty, Adam Levin explains the dangers of e-skimming, where malicious code is deployed to e-commerce sites to steal customer payment information. The post Be On The Lookout for E-Skimmers – Third Certainty #9 appeared first on Adam Levin. Data Security Video Third Certainty Technology featured third certainty e-skimmers e-commerce

Where should information management live in the organization?


I returned to downtown Washington, DC, last week to teach the AIIM Foundations of Intelligent Information Management (FIIM) course. The class started with some icebreaker exercises, including asking the students to define, in their own words, “ What is information management? There were some fantastic definitions generated from the students for this and other discussion questions throughout the course.

Another Day, Another Data Breach — an Update on Data Security


The post Another Day, Another Data Breach — an Update on Data Security appeared first on Zapproved. Industry News data breach Security technology

Reminder: Comment on Universal Electronic Records Management Requirements by December 6, 2019

National Archives Records Express

As we announced in a previous post , we are requesting comments on the Universal Electronic Records Management Requirements as part of our Federal Electronic Records Modernization Initiative (FERMI). Please share widely so we can receive comments from a variety of stakeholders. We would like to receive all comments by Friday, December 6, 2019. If you have any questions, please leave a comment or email us at FERMI electronic records management requirements

Why GDPR compliance requires a software solution

IT Governance

All organisations need help complying with the GDPR (General Data Protection Regulation). You might not be able to bring in expert consultants, but there are software packages to help with the majority of your compliance requirements, from risk assessments to data breach reporting. IT Governance’s CyberComply platform contains all the software solutions you need in one bundle. Let’s take a look at what it covers and how it simplifies your GDPR requirements. What is CyberComply?