Tue.Jun 28, 2022

article thumbnail

The 3 Key Phases of CI/CD-Driven DevOps

Rocket Software

As organizations increasingly turn to DevOps to meet the needs of their customers and users, it’s critical they establish best practices to ensure success. True continuous integration/continuous delivery (CI/CD) testing is critical to stay innovative, and our blog posts outlining the five best practices for IBM i and five steps to planning CI/CD for IBM i each provide a great guide to making that happen.

article thumbnail

Italian Watchdog Says Google Analytics a Privacy Violation

Data Breach Today

Absence of Trans-Atlantic Data Framework Converts Analytics Tool Into a Risk Italy joined France and Austria in warning domestic companies to shy away from Google Analytics. The decision by the Italian data protection authority highlights ongoing legal uncertainty trans-Atlantic transfers of commercial data.

Analytics 270
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Link Between AWM Proxy & the Glupteba Botnet

Krebs on Security

On December 7, 2021, Google announced it was suing two Russian men allegedly responsible for operating the Glupteba botnet, a global malware menace that has infected millions of computers over the past decade. That same day, AWM Proxy — a 14-year-old anonymity service that rents hacked PCs to cybercriminals — suddenly went offline. Security experts had long seen a link between Glupteba and AWM Proxy, but new research shows AWM Proxy’s founder is one of the men being sued by Goo

Passwords 242
article thumbnail

A Shortcut to the NIST Cybersecurity Framework

Data Breach Today

Evaluating Where You are Versus Where You Want to Be Determine how the NIST Framework can fit into your security structure and start taking proactive steps to protect critical assets from rising and evolving threats.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Fireside chat: The inevitable replacement of VPNs by ‘ZTNA’ — zero trust network access

The Last Watchdog

Virtual Private Networks – VPNs – remain widely used in enterprise settings. Don’t expect them to disappear anytime soon. This is so, despite the fact that the fundamental design of a VPN runs diametrically opposed to zero trust security principles. I had the chance to visit with David Holmes, network security analyst at Forrester, to learn more about how this dichotomy is playing out as companies accelerate their transition to cloud-centric networking.

Access 216

More Trending

article thumbnail

Canada’s artificial intelligence legislation is here

Data Protection Report

On 16 June 2022 the Canadian federal government introduced Bill C-27, also known as the Digital Charter Implementation Act 2022. If passed, this package of laws will: Implement Canada’s first artificial intelligence ( AI ) legislation, the Artificial Intelligence and Data Act ( AIDA ). Reform Canadian privacy law, replacing the Personal Information Protection and Electronic Documents Act with the Consumer Privacy Protection Act.

article thumbnail

GAO: HHS Needs Breach Reporting Feedback Mechanism

Data Breach Today

Report Calls for New HHS Communication Method for Breached Entities To help improve HIPAA breach reporting, the Department of Health and Human Services should implement a formal mechanism for organizations to communicate with regulators about that process, according to a new report from the Government Accountability Office.

article thumbnail

Latest OpenSSL version is affected by a remote memory corruption flaw

Security Affairs

Expert discovered a remote memory-corruption vulnerability affecting the latest version of the OpenSSL library. Security expert Guido Vranken discovered a remote memory-corruption vulnerability in the recently released OpenSSL version 3.0.4. The library was released on June 21, 2022, and affects x64 systems with the AVX-512 instruction set. “OpenSSL version 3.0.4, released on June 21th 2022, is susceptible to remote memory corruption which can be triggered trivially by an attacker.

Libraries 120
article thumbnail

When Security Locks You Out of Everything

Schneier on Security

Thought experiment story of someone of someone who lost everything in a house fire, and now can’t log into anything: But to get into my cloud, I need my password and 2FA. And even if I could convince the cloud provider to bypass that and let me in, the backup is secured with a password which is stored in—you guessed it—my Password Manager.

Passwords 111
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Facebook Business Pages Targeted via Chatbot in Data-Harvesting Campaign

Dark Reading

The clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.

Phishing 122
article thumbnail

NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE

Security Affairs

This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s socioeconomic structure. Cyber Non-State Actors (CNSA) are key figures in our globalized world: their operations could have a significant impact on international affairs, politics, and on the economy, as much as states do.

Paper 97
article thumbnail

HIPAA Compliance & the Role of Enterprise Information Archiving

Hanzo Learning Center

Most people have heard of the Health Insurance Portability and Accountability Act (HIPAA), so it’s not surprising that companies dealing with digital health information will have to be HIPAA compliant. To do so, any protected health information (PHI) must be kept confidential, secure, and available when being stored or transmitted. HIPAA also requires healthcare providers to implement safeguards protecting PHI against cyber threats, security breaches, and other improper use of health data.

article thumbnail

5 reasons Mac is a must in the enterprise

Jamf

Enterprise companies are beginning to understand that to retain top talent they need to offer and support Mac devices. Not only do employees prefer them, but Mac devices also perform better and last longer than PC. Combine employee empowerment with a lower Apple TOC and higher Mac ROI, and it’s clear why Mac is better in the enterprise.

IT 94
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New Vulnerability Database Catalogs Cloud Security Issues

Dark Reading

Researchers have created a new community website for reporting and tracking security issues in cloud platforms and services — plus fixes for them where available.

Cloud 98
article thumbnail

ZuoRAT malware hijacks SOHO Routers to spy in the vitims

Security Affairs

A new RAT dubbed ZuoRAT was employed in a campaign aimed at small office/home office (SOHO) routers in North American and Europe. Researchers from Black Lotus Labs, the threat intelligence division of Lumen Technologies , have discovered a new remote access trojan (RAT) called ZuoRAT, which targets small office/home office (SOHO) devices of remote workers during COVID-19 pandemic.

article thumbnail

How to Find New Attack Primitives in Microsoft Azure

Dark Reading

Abuse primitives have a longer shelf life than bugs and zero-days and are cheaper to maintain. They're also much harder for defenders to detect and block.

98
article thumbnail

Colorado AG Seeks Public Input on CPA Rulemaking

Hunton Privacy

On June 21, 2022, the Colorado Attorney General’s Office announced it is seeking informal input from the public on its rulemaking related to the Colorado Privacy Act (“CPA”). Before starting its formal rulemaking process, the Office has indicated it wants to better “understand the community’s thoughts and concerns about data privacy.”. The public can provide feedback on any aspect of the CPA, but the Colorado Attorney General’s Office specifically requested commentary on the following topics: Un

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

China-Backed APT Pwns Building-Automation Systems with ProxyLogon

Dark Reading

The previously unknown state-sponsored group is compromising industrial targets with the ShadowPad malware before burrowing deeper into networks.

99
article thumbnail

Seven Signs You’re A Data Hoarder And Why That’s Bad For You via The Economic Times

IG Guru

Check out the article here. The post Seven Signs You’re A Data Hoarder And Why That’s Bad For You via The Economic Times appeared first on IG GURU.

article thumbnail

'Raccoon Stealer' Scurries Back on the Scene After Hiatus

Dark Reading

Researchers this week said they had observed criminals using a new and improved version of the prolific malware, barely three months after its authors announced they were quitting.

IT 83
article thumbnail

Try the new Compliance Audit Readiness Assessment today for the NIST Cybersecurity Framework

KnowBe4

When it's time to complete a compliance audit of your cybersecurity readiness plan, are you thinking, "Ugh, is it that time again?".

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A WAF Is Not a Free Lunch: Teaching the Shift-Left Security Mindset

Dark Reading

Developers need to think like WAF operators for security. Start with secure coding and think of Web application firewalls not as a prophylactic but as part of the secure coding test process.

article thumbnail

‘Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade

Threatpost

Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.

IT 79
article thumbnail

Google Analytics Continues to Lose SEO Visibility as Bans Continue

Dark Reading

Google Analytics has been found to be in violation of GDPR privacy laws by Italy — the third country to ban it.

Analytics 103
article thumbnail

Mitel VoIP Bug Exploited in Ransomware Attacks

Threatpost

Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Atlassian Confluence Exploits Peak at 100K Daily

Dark Reading

Swarms of breach attempts against the Atlassian Confluence vulnerability are likely to continue for years, researchers say, averaging 20,000 attempts daily as of this week.

80
article thumbnail

‘Supercookies’ Have Privacy Experts Sounding the Alarm

WIRED Threat Level

A German ad-tech trial features what Vodafone calls “digital tokens.” Should you be worried?

Privacy 97
article thumbnail

RSA 2022: Omdia Research Take Aways

Dark Reading

The RSA conference in San Francisco always feels like drinking from a fire hose but especially this year at the first in-person RSA since the pandemic began.

80