Mon.Dec 16, 2019

article thumbnail

Understanding the Risk of Zero-Day Exploits

Threatpost

While the best protective measures can't protect your business completely from a zero-day attack, many of the same cybersecurity best practices are useful for protecting against zero-day exploits.

Risk 54
article thumbnail

What Should I Look for in a Data Protection Officer?

Dark Reading

The right candidate will possess the following skills.

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Payroll Data of 29,000 Facebook Employees Stolen: Report

Data Breach Today

Data Stored on Unencrypted Hard Drives Stolen From Car, Bloomberg Reports The payroll data of 29,000 current and former Facebook employees was potentially exposed when several unencrypted hard disk drives were stolen, Bloomberg reports.

162
162
article thumbnail

Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up

Krebs on Security

As if the scourge of ransomware wasn’t bad enough already: Several prominent purveyors of ransomware have signaled they plan to start publishing data stolen from victims who refuse to pay up. To make matters worse, one ransomware gang has now created a public Web site identifying recent victim companies that have chosen to rebuild their operations instead of quietly acquiescing to their tormentors.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Lifecycle of Stolen Payment Data

Data Breach Today

Fiserv's Christine El Eris on How Fraudsters Sit on and Sell Stolen Card Data Even in the post-EMV era, payment card data is very much thriving on the dark web. Why is data still so accessible to fraudsters, and how can card issuers and merchants alike improve card data security? Christine El Eris of Fiserv discusses fraud trends.

Access 245

More Trending

article thumbnail

Insurer Races to Fix Security Flaws After Whistleblower Alert

Data Breach Today

Report: Blue Cross and Blue Shield Minnesota Had Thousands of Old 'Critical' Vulnerabilities Blue Cross and Blue Shield Minnesota is reportedly racing to address tens of thousands of security vulnerabilities after a whistleblower on the health insurer's security team alerted the company's board of trustees about the problems. Why do some companies lag on addressing security issues?

Insurance 245
article thumbnail

The War Vet, the Dating Site, and the Phone Call From Hell

WIRED Threat Level

Jared Johns found out too late that swapping messages with the pretty girl from a dating site would mean serious trouble. If only he had known who she really was.

article thumbnail

AI: 'We're Having the Wrong Conversation'

Data Breach Today

Chris Calvert of Respond Software on the Proper Roles for Machines Just by using the term "artificial intelligence," we're already having the wrong conversation about machines and cybersecurity, says Chris Calvert of Respond Software. What conversations should we be having? Calvert discusses the proper balance of humans and machines.

article thumbnail

Gradual automation is crucial for legal IT

OpenText Information Management

Paul Obernuefemann began his career in IT before IT existed. Back then, he was the ‘computer guy,’ employed to keep the servers up and printers humming. Now, as CIO for Lewis Rice, he leads the law firm’s high-performing IT strategies, inseparable from business success. We recently sat down with Paul to discuss the evolution of … The post Gradual automation is crucial for legal IT appeared first on OpenText Blogs.

IT 88
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Visa: Gas Station Networks Targeted to Steal Card Data

Data Breach Today

Network Attacks an Alternative to Use of Skimmers on Pumps, Alert Notes Several sophisticated cybercriminals gangs are targeting "fuel dispenser merchants" throughout North America, in some cases by planting malware within corporate networks to steal payment card data, Visa warns in a new alert.

189
189
article thumbnail

A thief stole hard drives containing Facebook payroll data from a car

Security Affairs

Facebook informed its employees that hard drives containing information about its workers’ payroll were stolen from a car last month. On Friday, Facebook announced that hard drives containing information about its workers’ payroll were stolen from a car last month. According to the company, a thief stole unencrypted hard drives containing banking data belonging to 29,000 Facebook employees.

article thumbnail

Identity Theft Protection: A Crucial Consideration in Today's Heightened Environment

Data Breach Today

Why IDShield Partners with Enzoic for Comprehensive Identity Theft Protection According to the Identity Theft Resource Center, there were over 1,200 reported breaches last year alone, which exposed over 400 million records.

182
182
article thumbnail

Cloud Data Security: Who Should Hold the Keys?

Thales Cloud Protection & Licensing

Nearly half (48%) of all corporate data is stored in the cloud according to the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute. Organizations admitted that on average, only about half (49%) of the data stored in the cloud is secured with encryption and only one-third (32%) believe protecting data in the cloud is their responsibility.

Cloud 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ryuk Eyed as Culprit in New Orleans Ransomware Outbreak

Data Breach Today

State of Emergency Declared by City; Employees Ordered to Power Down Everything Suspicious code uploaded to VirusTotal points to Ryuk ransomware being used in a crypto-locking malware attack against New Orleans. Mayor LaToya Cantrell has declared a state of emergency and the city is continuing its recovery, noting that no emergency services have been affected.

article thumbnail

Costco EDI compliance made easy

OpenText Information Management

While it’s easy for small business owners to think that digital transformation is primarily an issue for large enterprises, many retailers prefer, or even require, all their suppliers to be EDI savvy. Costco Wholesale is a multi-billion dollar global retailer with warehouse club operations in eight countries. To be stocked in Costco, all suppliers – … The post Costco EDI compliance made easy appeared first on OpenText Blogs.

article thumbnail

Cybersecurity 2020: Connected Devices Strike Back

Data Breach Today

Microsoft's Diana Kelley on How to Approach Security for IoT What connected devices are sneaking into the enterprise, and the advent of 5G technology only broadens the potential attack surface. Diana Kelley of Microsoft discusses the growing risks from connected devices and how to approach mitigation in 2020.

article thumbnail

The differing attitudes to digital transformation in the utility sector

OpenText Information Management

There are few utility organizations today that don’t understand or appreciate the benefits of digital transformation. However, a new whitepaper published by OpenText™ reveals a range of attitudes regarding how quickly these companies feel they will get there. Utility companies worldwide face incredible pressures caused by a host of factors – including deregulation, the growth … The post The differing attitudes to digital transformation in the utility sector appeared first on OpenText

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Cyber Confidence Matters

Data Breach Today

Nominet's Alex Pitigoi on the Metrics and Value of Enterprise Cybersecurity How confident are security leaders in their enterprise cybersecurity posture? And in turn, how are business leaders marketing cyber confidence to customers and partners? Alex Pitigoi of Nominet shares insights and analysis from new research.

article thumbnail

A study reveals the list of worst passwords of 2019

Security Affairs

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by analyzing data leaked in various data breaches. Independent anonymous researchers, compiled and shared with security firm NordPass a list of 200 most popular passwords that were leaked in data breaches during 2019. The company collected 500 million passwords in total and the results were disconcerting.

article thumbnail

Keybase Nixes Stellar Airdrop After Spam, Fake Accounts

Data Breach Today

Volume of Fake Accounts Beyond What Could Be Filtered Encrypted chat and messaging application Keybase has found out what happens when you wrap a cryptocurrency giveaway into your service. In short: Everyone comes out the woodwork to try to get a slice of the pie.

article thumbnail

Still Why No HTTPS?

Troy Hunt

Back in July last year, Scott Helme and I shipped a little pet project that tracked the world's largest websites not implementing HTTPS by default. We called it Why No HTTPS? and it gave people a way to see the largest websites not taking transport layer security seriously. We also broke the list down on a country-by-country basis and it quickly became a means of highlighting security gaps and serving as a "list of shame".

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Schneider Electric fixes DoS flaws in Modicon, EcoStruxure products

Security Affairs

Schneider Electric addressed several vulnerabilities in some Modicon controllers and several EcoStruxure products. Schneider Electric addresses three denial-of-service ( DoS ) vulnerabilities Schneider Electric Modicon M580, M340, Quantum and Premium controllers. The vendor has informed its customers that all three flaws are caused by improper check for unusual or exceptional conditions.

article thumbnail

7 top trends that will impact data management and cloud computing in 2020

Information Management Resources

Organizations will focus on investing in the public cloud while maintaining their on-prem Hadoop, one 'ML framework to rule them all', and 'Kubernetifying' the analytics stack.

Cloud 65
article thumbnail

Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019

Dark Reading

Meanwhile, the mayor of the city of New Orleans says no ransom money demands were made as her city struggles to recover from a major ransomware attack launched last week.

article thumbnail

Experts found binary planting and arbitrary file overwrite flaws in NPM

Security Affairs

NPM , the biggest package manager for JavaScript libraries, has addressed a vulnerability that could be exploited to execute “binary planting” attacks. NPM maintainers have addressed a vulnerability that could allow a package publisher to modify and/or gain access to arbitrary files on a user’s system when the package is installed, so-called “binary planting” attacks.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Disarming Disinformation

Dark Reading

Disinformation attacks are just as detrimental to businesses as they are to national elections. Here's what's at stake and what infosec teams can do about them.

60
article thumbnail

Why is a data catalog essential to making your data lakes successful?

IBM Big Data Hub

All industries—from healthcare to retail to banking—are digitally transforming themselves every day to become more agile and stay competitive. However, all industries depend on data to be successful, and this impacts the way enterprises plan and execute their operations.

article thumbnail

AWS Storage from Snowball to Glacier

Adapture

A cloud migration is a complex, yet necessary, process that—once optimized—increases data availability and reduces operational expenses. Your IT team can handle moving marginal amounts of data to a web-based console, but the logistics of moving terabytes, or even petabytes of data to AWS storage, is another story. With your lean IT Team, you’re going [ ] The post AWS Storage from Snowball to Glacier appeared first on ADAPTURE.

Cloud 52