Wed.Aug 08, 2018

article thumbnail

300,000 Records Found at Hospital Slated for Demolition

Data Breach Today

Documents Discovered Four Years After Hospital Moved to New Facilities Documents containing information on more than 300,000 patients were recently discovered on the former campus of a Missouri hospital that's being prepared for demolition four years after the hospital moved to new facilities. The incident illustrates the need to track all paper records that contain PHI.

Paper 113
article thumbnail

GDPR After the Deadline — Part 3 of 3 — How do IIM technologies fit into the GDPR puzzle?

AIIM

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. We just published a new market research report on GDPR. The purpose of this survey of 262 executives was to quantify – as close to the May 25th deadline as possible – the following three key issues related to GDPR: How do organizations view the emerging challenges tied to information privacy and securi

GDPR 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 Easy Steps to Successful Application Control Deployment

Data Breach Today

Learn about strategies and best practices for success. Application control remains one of the best techniques for blocking the vast majority of malware threats; however, implementation often falters due to poor planning.

100
100
article thumbnail

GDPR After the Deadline — Part 3 of 3 — How do IIM technologies fit into the GDPR puzzle?

AIIM

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. We just published a new market research report on GDPR. The purpose of this survey of 262 executives was to quantify – as close to the May 25th deadline as possible – the following three key issues related to GDPR: How do organizations view the emerging challenges tied to information privacy and securi

GDPR 80
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Training to Improve Support of Product Security

Data Breach Today

The Forum of Incident Response and Security Teams recently announced the release of new training resources to help organizations build and improve product security incident response teams. Damir "Gaus" Rajnovic of FIRST discusses the global need for these resources.

Security 100

More Trending

article thumbnail

Political Play: Indicting Other Nations' Hackers

Data Breach Today

Attributing Hack Attacks to Governments Remains a Diplomatic Tool. Does It Work? Espionage: Every nation does it. But for nation-state hacking that targets intellectual property or interference in political affairs, the U.S. has been using criminal indictments against individuals as a diplomatic way of saying: "We see what you're doing, now knock it off.

article thumbnail

FTC Asks Whether to Expand Enforcement Power over Corporate Privacy Practices

Hunton Privacy

On August 6, 2018, the Federal Trade Commission published a notice seeking public comment on whether the FTC should expand its enforcement power over corporate privacy and data security practices. The notice, published in the Federal Register , follows FTC Chairman Joseph Simons’ declaration at a July 18 House subcommittee hearing that the FTC’s current authority to do so, under Section 5 of the FTC Act, is inadequate to deal with the privacy and security issues in today’s market.

Privacy 56
article thumbnail

China Hacking Underground Shows Rising Prowess

Data Breach Today

New Report Reveals New Malware, New Threats, New Threat Actors Much of the attention around Chinese hacking is directed toward advanced threat groups suspected to have links to China's government. But a new report shows that the nation's hacking goes far deeper, and there's a thriving scene that has adapted to an internet heavily controlled by the government.

article thumbnail

SpiderOak's Warrant Canary Died

Schneier on Security

BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace the warrant canary with a transparency report, they would have written something explaining their decision. To have it simply disappear is what we would expect if SpiderOak were being forced to comply with a US government request for personal data.).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

10 Threats Lurking on the Dark Web

Dark Reading

Despite some high-profile takedowns last year, the Dark Web remains alive and well. Here's a compilation of some of the more prolific threats that loom.

54
article thumbnail

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Security Affairs

Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, created by Ramnit operators. Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, that could be the sign of a wider ongoing operation involving the Ramnit operators.

article thumbnail

Manufacturing Industry Experiencing Higher Incidence of Cyberattacks

Dark Reading

New report reveals the natural consequences of ignoring the attendant risks of industrial IoT and Industry 4.0.

article thumbnail

Brexit is coming: Will your financial contracts be ready?

OpenText Information Management

With the G7 conference in the news, it seems timely to address the looming spectre of Brexit for derivatives traders and finance professionals. Millions of derivatives contracts impacting trillions of dollars are poised to be impacted by potential legal conflicts arising out of the UK’s split from the EU. It is in this context that, … The post Brexit is coming: Will your financial contracts be ready?

IT 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

White Hat to Black Hat: What Motivates the Switch to Cybercrime

Dark Reading

Almost one in ten security pros in the US have considered black hat work, and experts believe many dabble in criminal activity for financial gain or employer retaliation.

article thumbnail

Online Stock Trading Has Serious Security Holes

WIRED Threat Level

An analysis of dozens of trading platforms reveals a range of cybersecurity concerns across mobile, desktop, and the web.

article thumbnail

Snapchat source Code leaked after an iOS update exposed it

Security Affairs

Hackers leaked the Snapchat source code on GitHub, after they attempted to contact the company for a reward. Hackers gained access to the source code of the frontend of Snapchat instant messaging app for iOS and leaked it on GitHub. A GitHub account associated with a person with the name Khaled Alshehri who claimed to be from Pakistan and goes online with the handle i5xx created the GitHub repository titled Source-Snapchat.

IT 45
article thumbnail

New Pluralsight Course: Modern Browser Security Reports

Troy Hunt

Rounding out a recent spate of new Pluralsight courses is one final one: Modern Browser Security Reports. This time, it's with Scott Helme who for most of my followers, needs no introduction. You may remember Scott from such previous projects as securityheaders.io , Report URI and, as it relates to this course, our collective cleaning up at a couple of recent UK awards nights: With @Scott_Helme (at a different awards night) learning we both just scored at the European Cyber Security Blogger Awar

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Threatlist: Manufacturing, a Top Target for Espionage

Threatpost

Vectra’s 2018 Spotlight Report found that attackers can easily spy, spread and steal information, largely unhindered by the insufficient internal access controls that are in place.

article thumbnail

Breaking Down the PROPagate Code Injection Attack

Dark Reading

What makes PROPagate unique is that it uses Windows APIs to take advantage of the way Windows subclasses its window events.

IT 50
article thumbnail

Black Hat 2018: Google’s Tabriz Talks Complex Security Landscapes

Threatpost

At Black Hat, Google's Parisa Tabriz discussed how to navigate the complex security environment with long-term thinking and a policy of open collaboration.

article thumbnail

No, The Mafia Doesn't Own Cybercrime: Study

Dark Reading

Organized crime does, however, sometimes provide money-laundering and other expertise to cybercriminals.

55
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

RIM Subject Matter Expert Needed

IG Guru

The hiring of a RIM subject matter expert (SME) specifically to represent and advise members of the PRISM International division was one of the big initial “wins,” of the recent merger. (PRISM/NAID) Earlier this week, the i-SIGMA Executive Committee agreed on the RIM SME Job Description for the new position and is now inviting qualified individuals to express their […].

article thumbnail

Getting started with robotic process automation in government is easier than you think

CGI

Getting started with robotic process automation in government is easier than you think. harini.kottees…. Wed, 08/08/2018 - 06:51. Robotic process automation (RPA) is perhaps the most visible aspect of intelligent automation right now. It stands to transform agency operations by freeing up employees or contractors from repetitious tasks such as paying invoices, filing documents or managing human resources records.

article thumbnail

2019 Conference Call for Presentations – NAID/PRISM (i-SIGMA)

IG Guru

NAID and PRISM International have already begun planning for next year’s conference. If you have an idea for a session that would benefit those in the secure data destruction or records information management industries or an interest in presenting at the 2019 conference, now is the time to act. Answer the Call for Presentations: Suggest […].

article thumbnail

What Is a Disaster Recovery Plan and Why It’s Important

Record Nations

Organizations can’t always avoid disasters, however having disaster recovery plans and the preventative measures they include are essential for minimizing potential damage, quickly getting things back up and running, and most importantly preventing disasters in the first place. In this video learn more about what a disaster recovery plan is, why it’s important—including statistics and […].

IT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Staffing and Collaboration for Digital Archival Projects

IG Guru

Staffing needs for digital projects depend on the project’s size and complexity. Training existing staff members to work on digitization projects is a critical component of change management within the institution because digital projects require new skills. The digital age is moving memory institutions into new paradigms of delivering both services and content, and this […].

article thumbnail

What Is a Disaster Recovery Plan and Why It’s Important

Record Nations

Organizations can’t always avoid disasters, however having disaster recovery plans and the preventative measures they include are essential for minimizing potential damage, quickly getting things back up and running, and most importantly preventing disasters in the first place. In this video learn more about what a disaster recovery plan is, why it’s important—including statistics and […].

IT 40
article thumbnail

Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push

Dark Reading

Google engineering director Parisa Tabriz took the Black Hat keynote stage to detail the Chrome transition and share advice with security pros.