Mon.Feb 25, 2019

article thumbnail

Data Breach Notification: California Targets 'Loopholes'

Data Breach Today

Marriott's Starwood Mega-Breach Drives Data Protection Update Driven by Marriott's Starwood mega-breach, California lawmakers are pushing legislation that would expand the state's pioneering data breach notification requirements to include breaches of biometric data and all types of government identification numbers, including passports.

article thumbnail

AIIM19 session preview - Absolute Intelligence: Taking the Artificial Out of AI

AIIM

AIIM19 is only a short time away and information management professionals from around the world will converge in San Diego for three days of sessions, sharing and fun. But what can you expect this year? In this continuing series of AIIM19 session previews we get a taste of what’s to come. I spoke recently with Angela Watt about her session, co-hosted with Emily Speight, titled “Absolute Intelligence: Taking the Artificial out of AI,” and I asked her to briefly summarize the topics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Parliamentary Panel Summons Facebook

Data Breach Today

Action Aimed at Curbing Fake News Before Elections A parliamentary panel in India has summoned representatives of Facebook, its messaging services WhatsApp and photo-sharing app Instagram to appear early next month to discuss how to safeguard citizens' rights on social media.

IT 173
article thumbnail

Celebrating diversity and women in technology in India

OpenText Information Management

This year, OpenText™ sent our first official delegation of talented female employees from our Hyderabad and Bangalore offices to the Grace Hopper Celebration India (GHCI). As Asia’s largest gathering of women technologists, GHCI provided our delegation with incredible learning and networking opportunities. I had the pleasure of joining our inaugural Indian delegation to GHCI in … The post Celebrating diversity and women in technology in India appeared first on OpenText Blogs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UConn Health Among the Latest Apparent Phishing Victims

Data Breach Today

A Number of Newly Reported Health Data Breaches Stem From Email Incidents Phishing and other hacking incidents have led to several recently reported large health data breaches, including one that UConn Health reports affected 326,000 individuals.

Phishing 168

More Trending

article thumbnail

The Gap Between Mobile Apps and Privacy

Data Breach Today

Privacy 217
article thumbnail

Blockchain White Paper

National Archives Records Express

We are pleased to announce the release of our Blockchain White Paper. The white paper began as an internal effort to assist NARA staff in learning more about the technology and how agencies are using it. While it includes a very high-level overview of the technical aspects of blockchain, it is useful to records managers because it explores the various implications for Federal electronic records management programs.

article thumbnail

B0r0nt0K ransomware demands $75,000 ransom to the victims

Security Affairs

The recently discovered B0r0nt0K ransomware infects both Linux and Windows servers and demands $75,000 ransom to the victims. A new piece of ransomware called B0r0nt0K appeared in the threat landscape, it is targeting web sites and demanding a 20 bitcoin ransom to the victims (roughly $75,000). This B0r0nt0K ransomware infects both Linux and Windows servers.

article thumbnail

TurboTax Hit with Cyberattack, Tax Returns Compromised

Dark Reading

Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source.

105
105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ToRPEDO attack allows intercepting calls and track locations on 4G/5G

Security Affairs

ToRPEDO attacks – A group of academics from Purdue University and the University of Iowa discovered multiple vulnerabilities in cellular networks that affect both 4G and 5G LTE protocols. A group of academics from Purdue University and the University of Iowa discovered multiple vulnerabilities in cellular networks that affect both 4G and 5G LTE protocols.

Paper 88
article thumbnail

The 8 CISSP domains explained

IT Governance

The CISSP ® (Certified Information Systems Security Professional) qualification is one of the most respected certifications in the information security industry, demonstrating an advanced knowledge of cyber security. We recently discussed the benefits of becoming a CISSP. Now, we turn our attention to the structure of the qualification itself and the domains within it.

article thumbnail

Malware spam campaign exploits WinRAR flaw to deliver Backdoor

Security Affairs

Experts discovered a malspam campaign that is distributing a malicious RAR archive that could exploit the WinRAR flaw to install deliver malware on a computer. A few days ago, security experts at CheckPoint software have disclosed a critical 19-year-old vulnerability in the WinRAR that could be exploited by attackers to gain full control over a target computer.

article thumbnail

Belgian DPA Publishes Updated List of Processing Activities Requiring DPIA

Hunton Privacy

The Belgian Data Protection Authority (the “Belgian DPA”) recently published (in French and in Dutch ) the updated and final list of the types of processing activities which require a data protection impact assessment (“DPIA”). Article 35.4 of the EU General Data Protection Regulation (“GDPR”) obligates supervisory authorities (“SAs”) to establish a list of the processing operations that require a DPIA and transmit it to the European Data Protection Board (the “EDPB”).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Expert awarded $10,000 for a new XSS flaw in Yahoo Mail

Security Affairs

A security expert discovered a critical cross-site scripting (XSS) flaw in Yahoo Mail that could have been exploited to steal the targeted user’s emails and attach malicious code to their outgoing messages. Yahoo addressed a critical cross-site scripting (XSS) vulnerability in Yahoo Mail that could have been exploited by hackers to steal user’s emails and attach malicious code to their outgoing messages.

article thumbnail

Google Ditches Passwords in Latest Android Devices

Threatpost

Google has announced FIDO2 certification for devices running on Android 7 and above - meaning that users can use biometrics, fingerprint login or PINs instead of passwords.

article thumbnail

Prosecutors ask 3-Year Sentence in ‘Fappening’ Case for ex-teacher

Security Affairs

Fappening case – Federal prosecutors requested a 3-year prison sentence for a former Virginia high school teacher convicted of hacking into private digital accounts of celebrities and others. Federal prosecutors requested a 3-year prison sentence for Christopher Brannan(31), a former Virginia high school teacher, that was convicted of hacking into private digital accounts of celebrities and others.

Access 82
article thumbnail

How to start your career in cyber security

IT Governance

A version of this blog was originally published on 8 December 2017. There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. How much experience do you need?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

3 Tips for Crushing Information Silos at Work

Synergis Software

When you hear the word silo, you might picture the tall round buildings filled with grain. But silos have another meaning in the business world. Virtual silos exist when information is not openly and consistently shared between people or among departments. They are a huge and costly hurdle for any organization that needs to be nimble and competitive on a global scale.

article thumbnail

Secure the System, Help the User

Dark Reading

The enterprise must do its part in deploying and maintaining secure systems so that end users stand a chance against attackers.

article thumbnail

There’s no good way to transport autonomous car test data — yet

DXC Technology

Behind the scenes at locations around the world the auto makers are running tests on autonomous cars for literally thousands of hours. The industry has poured more than $80 billion into R&D on autonomous cars over the last four years, so they are serious about making this happen. Those of us working on these tests […].

article thumbnail

Android Is Helping Kill Passwords on a Billion Devices

WIRED Threat Level

By officially embracing the FIDO2 standard, Android will soon let you log into sites and services without having to remember a password.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Threatpost Data: Password Managers Are Worth the Risk, Readers Say

Threatpost

A Threatpost reader poll examined risk, vulnerabilities, 2FA, the human element, attitudes on spreadsheets and more when it comes to password managers.

article thumbnail

TurboTax Hit with Credential Stuffing Attack, Tax Returns Compromised

Dark Reading

Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source.

73
article thumbnail

Current job market for IT pros looks promising

DXC Technology

Concerns about an economic slowdown notwithstanding, this year promises to be a good one if you’re an IT professional, according to an annual report by Spiceworks. In its 2019 State of IT Careers report, the network for IT professionals surveyed 1,000 tech professionals in businesses across North America and Europe. “The results show that as IT pros […].

article thumbnail

Delivering ROI through simplified IT management

Jamf

In part one of our three-part blog series, we examine how Jamf Pro delivers a compelling return on investment (ROI) by streamlining IT tasks.

IT 64
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Arm Certification Aims to Secure IoT Devices

Dark Reading

A three-tier certification regimen shows adherence to the Platform Security Architecture.

IoT 76
article thumbnail

Db2 for z/OS: Isolating REST Client Activity in Db2 Monitor Accounting Reports

Robert's Db2

In an entry posted to this blog some years ago , I described the form of a Db2 monitor-generated accounting report that I most like to use to get an overall view of application activity in a Db2 for z/OS environment: an accounting long report with data ordered by connection type (here, I am using terminology associated with the Db2 monitor with which I'm most familiar: IBM's Tivoli OMEGAMON XE for Db2 Performance Expert on z/OS ).

article thumbnail

Russian Hacker Pleads Guilty to Bank Fraud

Dark Reading

The hacker ran a botnet that spread 'NeverQuest' malware for three years and collected millions of banking credentials.

58