Thu.Feb 20, 2020

GAO: Census Bureau Comes Up Short on Cybersecurity

Data Breach Today

With 2020 Census Slate to Start April 1, Bureau Still Has Work to Do The U.S. Census Bureau has not done enough to address cybersecurity issues in preparation for the 2020 census, which is slated to begin April, according to a new report from the Government Accountability Office

Firms Improve Threat Detection but Face Increasingly Disruptive Attacks

Dark Reading

In addition, more third parties are discovering the attacks rather than the companies themselves


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hacking of Accounting Firm Affects Medical Group

Data Breach Today

Apparent Ransomware Incident Exposes Patient Information An apparent ransomware attack on an accounting firm in December exposed the patient data of Community Care Physicians, a large upstate New York medical group, as well as other clients of the firm

Internet of Things Candle

Schneier on Security

There's a Kickstarter for an actual candle , with real fire, that you can control over the Internet. What could possibly go wrong? internetofthings


How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Hackers Post Details on MGM Resorts Guests: Report

Data Breach Today

Breached Cloud Server Contained Data on 10 Million Guests Hackers have posted on an underground forum the personal information of 10.6 million MGM Resorts guests, ZDNet reports. The hotel chain confirms it was breached last year

Cloud 194

More Trending

New Hacking Group Targets Gambling Firms: Report

Data Breach Today

APT Group Steals Source Code and Data, Not Money, Researchers Say A newly identified hacking group has been targeting gambling companies in Asia, the Middle East and Europe, using backdoors to steal source code and other data, according to new research from security firm Trend Micro

Croatia’s largest petrol station chain INA group hit by ransomware attack

Security Affairs

S ome operations at INA Group, Croatia’s biggest oil company, and its largest petrol station chain were disrupted by a cyber attack. A ransomware attack has disrupted operations at INA Group, Croatia’s biggest oil company, and its largest petrol station chain. INA , d.d.

RSAC 2020: The roaring 20s. A new decade brings new cybersecurity opportunities and challenges

Thales eSecurity

In a matter of a few days, security professionals from near and far will descend upon downtown San Francisco to attend the world’s premier cybersecurity event– RSA Conference 2020. This year’s theme, the Human Element, brings an entirely different perspective to bear.

Cloud 79

Cisco fixes a static default credential issue in Smart Software Manager tool

Security Affairs

Cisco has released security updates to address 17 vulnerabilities affecting its networking and unified communications product lines. Cisco has released security patches to fix 17 vulnerabilities affecting its networking and unified communications product lines.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

10 Tough Questions CEOs Are Asking CISOs

Dark Reading

CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer

Dragos Report: Analysis of ICS flaws disclosed in 2019

Security Affairs

More than 400 flaws affecting industrial control systems (ICS) were disclosed in 2019, more than 100 were zero-day vulnerabilities.

Personal Info of 10.6M MGM Resort Guests Leaked Online

Dark Reading

Data published on a hacking forum includes phone numbers and email addresses of travelers ranging from everyday tourists to celebrities and tech CEOs


Personal details of 10.6M MGM Resorts guests leaked online

Security Affairs

The personal information of 10.6 million guests who stayed at MGM Resorts hotels was stolen by hackers this summer and posted a hacking forum this week. ZDNet revealed in exclusive that the personal details of more than 10.6

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Microsoft Announces General Availability of Threat Protection, Insider Risk Management

Dark Reading

Microsoft made several security announcements ahead of RSA Conference, including its decision to bring Microsoft Defender to iOS and Android

Risk 74

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

Security Affairs

Britain and the United governments blame Russia for being behind a destructive cyber attack that hit Georgia during 2019. The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that hit Georgia during 2019.

Bluetooth-Related Flaws Threaten Dozens of Medical Devices

WIRED Threat Level

Hundreds of smart devices—including pacemakers—are exposed thanks to a series of vulnerabilities in the Bluetooth Low Energy protocol. . Security Security / Security News

Critical Adobe Flaws Fixed in Out-of-Band Update


Two critical Adobe vulnerabilities have been fixed in Adobe After Effects and Adobe Media Encoder. Vulnerabilities Web Security adobe adobe flash adobe flaw adobe media encoder adobe out of bound adobe patch after effects critical flaw frame maker out of bound patch

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Adobe released out-of-band updates for After Effects and Media Encoder apps

Security Affairs

Adobe released out-of-band security updates for After Effects and Media Encoder applications that address two new critical vulnerabilities.

IT 63

Cybergang Favors G Suite and Physical Checks For BEC Attacks


Exaggerated Lion, a newly discovered cybercrime group, uses new and unique tactics to target U.S. companies in BEC attacks. Hacks Web Security BEC Business Email Compromise exaggerated lion G Suite Gmail google Nigerian scam physical check

It's Time to Break the 'Rule of Steve'

Dark Reading

Today, in a room full of cybersecurity professionals, there are still more people called Steve than there are women

MGM Grand Breach Leaked Details of 10.6 Million Guests Last Summer


This week a hacking forum posted data from the breach—which included personal and contact details for celebrities, tech CEOs, government officials and employees at large tech companies.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

5 Strategies to Secure Cloud Operations Against Today's Cyber Threats

Dark Reading

With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud's many benefits

UK Google users could lose EU GDPR data protections

The Guardian Data Protection

Brexit prompts firm to move data and user accounts of British users from EU to US Google is to move the data and user accounts of its British users from the EU to the US, placing them outside the strong privacy protections offered by European regulators.


Google Bans 600 Android Apps for Obnoxious Ads


The Google Play apps violated the tech behemoth's disruptive advertising policies. Mobile Security 600 apps ad fraud advertising policy Android ban disruptive ads enforcement action google google play mobile apps

Cloud Provides Efficient Access to Healthcare Data

Perficient Data & Analytics

My last blog outlines cloud as a secure and central hub for all of your data. My next blog in this series examines how cloud provides efficient access to your healthcare data.

IIoT and the road to data monetization

OpenText Information Management

The implementation of the Industrial Internet of Things (IIoT) is bringing benefits to organizations in two key areas: operational improvements and data monetization.

Popular Mobile Document-Management Apps Put Data at Risk

Dark Reading

Most iOS and Android apps that Cometdocs has published on Google and Apple app stores transmit entire documents - unencrypted

Risk 58

Critical Cisco Bug Opens Software Licencing Manager to Remote Attack


A default password would let anyone access the Cisco Smart Software Manager On-Prem Base platform, even if it's not directly connected to the internet.

How to Become an Internal Influencer for Change


Enacting change is easier when you don’t have to go at it alone. In fact, a major factor in the success of organizational change comes down to internal buy-in with your co-workers. The more internal advocates you have on your side, the easier that positive change can spread quickly and efficiently.

Cloud 56