Fri.Feb 21, 2020

Defense Department Agency Reports Data Breach

Data Breach Today

Defense Information Systems Agency Has a Security Mission A U.S.

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

Just five years ago, the Public Key Infrastructure, or PKI , was seriously fraying at the edges and appeared to be tilting toward obsolescence. Things have since taken a turn for the better. Related: Why PKI is well-suited to secure the Internet of Things PKI is the authentication and encryption framework on which the Internet is built. The buckling of PKI a few years back was a very serious matter, especially since there was nothing waiting in the wings to replace PKI.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Ransomware Attack on EHR Vendor Impacts Home Health Chain

Data Breach Today

Personal Touch Home Care Explains Effect on Its Patients A home healthcare company has filed 17 breach reports after a ransomware attack on its cloud-based electronic health records vendor last December, illustrating once again how a vendor breach can have a wide impact

MGM Data Breach Affects Over 10 Million Customers

Adam Levin

The personal information of over 10.6 million customers of MGM Resorts has been published online. MGM Resorts confirmed the leaked data as being the result of a data breach that occurred last year.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Facilities Maintenance Firm Recovering From Malware Attack

Data Breach Today

ISS World Says 'Root Cause' Has Been Identified ISS World, a global facilities maintenance company based in Denmark, says it's gradually restoring its systems after a malware attack on Monday. The company says it has identified the root cause but has not said if ransomware was involved

More Trending

US, UK Blame Russia for Cyberattack in Country of Georgia

Data Breach Today

Allies Say GRU Hackers Crippled and Defaced Thousands of Websites U.S. and U.K. officials are blaming the Russian military for launching an October 2019 cyberattack on the country of Georgia that crippled at least 2,000 government, news media and court websites over the course of one day

Inrupt, Tim Berners-Lee's Solid, and Me

Schneier on Security

For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe how large companies have become central control points for our data.

IoT 99

SMS Phishing Campaign Used to Spread Emotet: Report

Data Breach Today

IBM Says Mobile Banking Customers Targeted With Fakes Messages and Domains Mobile banking customers are being targeted by yet another SMS phishing campaign, according to new research from IBM X-Force.

How Trump Hollowed Out US National Security

WIRED Threat Level

Acting director of national intelligence Richard Grenell is just the latest in a cascade of temporary or vacant personnel in critical government positions. . Security Security / National Security

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

What to Look for at RSA 2020 Conference

Data Breach Today

This special edition of the ISMG Security Report offers a preview of top keynote presentations at the RSA 2020 conference, plus a look at important themes and health tips for attendees

Olympics Could Face Disruption from Regional Powers

Dark Reading

Destructive attacks and disinformation will likely target the Summer Olympics in Tokyo, two groups of threat experts say


Weekly Update 179

Troy Hunt

On reflection, I feel this week's update was dominated by having a laugh at an IoT candle ?? And that's fair, too, even though I then went and bought one because hey, this is gonna be great conference talk material!

IoT 74

Security Now Merges With Dark Reading

Dark Reading

Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

VMware addresses serious flaws in vRealize Operations for Horizon Adapter

Security Affairs

VMware has addressed serious vulnerabilities in vRealize Operations for Horizon Adapter, including remote code execution and authentication bypass flaws.

California Man Arrested for Politically Motivated DDoS

Dark Reading

The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office


DOD DISA US agency discloses a security breach

Security Affairs

The Defense Information Systems Agency (DISA) US agency in charge of secure IT and communication for the White House has disclosed a data breach.

NRC Health Ransomware Attack Prompts Patient Data Concerns

Dark Reading

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Policy vs Technology

Schneier on Security

Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption. Matt Blaze and Ron Rivest were with me; I don't remember who else. We met with then Massachusetts Representative Ed Markey. (He

Active Attacks Target Popular Duplicator WordPress Plugin


When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then. Vulnerabilities Web Security

Emotet Malware Rears Its Ugly Head Again

Dark Reading

A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020

IT 64

Tame eDiscovery document review costs without increasing risk

OpenText Information Management

Demands on legal services within the enterprise have never been greater, extending beyond litigation and regulatory compliance to privacy, data security, and risk and crisis management. At the same time, budgets are being squeezed and legal departments are being asked to do more with less.

Risk 64

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Exclusive: Pakistan and India to armaments: Operation Transparent Tribe is back 4 years later

Security Affairs

Exclusive: Pakistan and India to armaments. Researchers from Cybaze-Yoroi ZLab gathered intelligence on the return of Operation Transparent Tribe is back 4 years later. Introduction.

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Welcome to the Age of the Internet of Bodies. A company in Wisconsin had a “chipping party” in 2017 to implant microchips in some of its employees to make it easier for them to access the buildings and systems and to buy food in the company break room. [1].

Lawsuit Claims Google Collects Minors’ Locations, Browsing History


A new lawsuit alleges that Google’s G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.

Jamf announces support for new Google Cloud secure LDAP service


As a Google Premier Partner, Jamf now offers a native Jamf Pro integration with Google LDAP. Whether using G Suite Enterprise or Cloud Identity Premium, Jamf Pro's unified authentication process is easy to set up

ISS World Hit with Malware Attack that Shuts Down Global Computer Network


The incident cut off access to e-mail and shared IT services across customer sites of the multinational Denmark-based facility-management firm.

23 Best Records Management Memes From Around The Web from FEITH

IG Guru

Nice work FEITH! Great content to liven your Friday if you are a RIM and IG pro! The post 23 Best Records Management Memes From Around The Web from FEITH appeared first on IG GURU. IG News Information Governance Records Management FEITH Funny MEMES RIM MEMES

How to Get CISOs & Boards on the Same Page

Dark Reading

These two groups have talked past each other for years, each hobbled by their own tunnel vision and misperceptions


Haken Malware Family Infests Google Play Store


Eight apps - mostly camera utilities and children's games - were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services.