Fri.Oct 11, 2024

article thumbnail

DOD Unveils Final CMMC Rule for Defense Contractors

Data Breach Today

New Cybersecurity Maturity Model Certification Rule Paves Way for Implementation The Department of Defense is set to implement significant changes to the Cybersecurity Maturity Model Certification program, effective October 15, streamlining compliance for contractors by introducing a tiered system while enhancing security standards.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

Passwordless Authentication without Secrets! divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel frustrated with frequent password resets. This highlights an increasing demand for advanced authentication methods like passkeys and multi-factor authentication (MFA), which provide robust security for most use cases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Prowling For Unencrypted BIG-IP Cookies, Warns CISA

Data Breach Today

Agency Says Cookies Could Help Attackers Find Network Assets, Vulnerabilities Unencrypted cookies tied to a suite of secure gateway technology from F5 are gateways for hackers to reach internal devices on corporate networks, warns the Cybersecurity and Infrastructure Security Agency. BIG-IP uses persistent cookies as a traffic load-balancing convenience.

article thumbnail

Iran and China-linked actors used ChatGPT for preparing attacks

Security Affairs

OpenAI disrupted 20 cyber and influence operations in 2023, revealing Iran and China-linked actors used ChatGPT for planning ICS attacks. OpenAI announced the disruption of over 20 cyber and influence operations this year, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks.

Phishing 127
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Regulating AI Catastophic Risk Isn't Easy

Data Breach Today

AI, Security Experts Discuss Who Defines the Risks, Mitigation Efforts An attempt by the California statehouse to tame the potential of artificial intelligence catastrophic risks hit a roadblock when Governor Gavin Newsom vetoed the measure late last month. One obstacle is lack of a widely-accepted definition for "catastrophic" AI risks.

Risk 297

More Trending

article thumbnail

Beyond Proof of Concepts: Will Gen AI Live Up to the Hype?

Data Breach Today

How Gen AI Is Evolving From Experimentation to Driving Major Business Impact As gen AI moves from hype to reality, 30% of projects are predicted to be abandoned after the proof-of-concept phase. Despite gen AI's enormous potential to boost revenue and productivity and reduce costs, organizations must perform a thorough assessment before committing to large-scale investments.

297
297
article thumbnail

Internet Archive data breach impacted 31M users

Security Affairs

The Internet Archive disclosed a data breach, the security incident impacted more than 31 million users of its “The Wayback Machine.” The Internet Archive is an American nonprofit digital library website that provides free access to collections of digitized materials including websites, software applications, music, audiovisual, and print materials.

Archiving 109
article thumbnail

Rhysida Leaks Nursing Home Data, Demands $1.5M From Axis

Data Breach Today

Ransomware Gang Could Have Axis Health's Mental Health, Drug Abuse Records Ransomware gang Rhysida is threatening to dump data on the dark web that belongs to a Colorado provider of mental health, substance abuse and other healthcare services unless it pays nearly $1.5 million. The group is leaking records it claims to have stolen from a Mississippi nursing home.

article thumbnail

GitLab fixed a critical flaw that could allow arbitrary CI/CD pipeline execution

Security Affairs

GitLab issued updates for CE and EE to address multiple flaws, including a critical bug allowing CI/CD pipeline runs on unauthorized branches. GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE) to address multiple vulnerabilities, including a critical bug, tracked as CVE-2024-9164 (CVSS score of 9.6), allowing CI/CD pipeline runs on unauthorized branches. “An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, st

Analytics 105
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

ISMG Editors: Chinese Hackers Raise Stakes in Cyberespionage

Data Breach Today

Also: AI Safety Bill Vetoed, Global Ransomware Response Guide Gets Some Revisions In the latest weekly update, ISMG editors discussed the implications of the U.S. investigation into Chinese hackers targeting telecom wiretap systems, the catastrophic risks of AI and the recent veto of an AI safety bill in the U.S., and the latest global ransomware response guidance.

article thumbnail

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

KnowBe4

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions.

Phishing 109
article thumbnail

More on My AI and Democracy Book

Schneier on Security

In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are hard at work writing. At this point, we would like feedback on titles. Here are four possibilities: Rewiring Democracy: How AI Will Transform our Politics, Government, and Citizenship The Thinking State: How AI Can Improve Democracy Better Run: How AI Can Make our Politics, Government, Citizenship More Efficient, Effective and Fair AI a

article thumbnail

Trinity Ransomware Targets the Healthcare Sector

KnowBe4

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

IronNet Has Shut Down

Schneier on Security

After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time while still in the military. That always troubled me. Whatever ideas he had, they were developed on public time using public resources: he shouldn’t have been able to leave military service with them in his back pocket.

article thumbnail

Microsoft blocked your Windows 11 upgrade? This just-released tool can get the job done

Collaboration 2.0

A new version of the popular Rufus utility once again bypasses Microsoft's strict hardware compatibility requirements for Windows 11 upgrades. But the way it's implemented might make some people nervous.

IT 98
article thumbnail

Celebrating the human touch: how Autoscore impacts customer service quality

OpenText Information Management

With artificial intelligence (AI) handling an increasing number of customer interactions, the role of human agents is more crucial than ever as we celebrate Customer Service Week 2024. Today, we're exploring how the OpenText â„¢ Contact Center Analytics solution, specifically its AutoScore module, is helping organizations identify and celebrate exceptional human-driven customer service in the age of AI.

article thumbnail

Ham radio is alive and well - and still a lifeline in disasters

Collaboration 2.0

When disaster strikes, and conventional communication systems fail, amateur ham radio operators step in to bridge the gap, providing a crucial link between those in affected areas and the outside world.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Indian Fishermen Are Catching Less Squid

Schneier on Security

Fishermen in Tamil Nadu are reporting smaller catches of squid. Blog moderation policy.

85
article thumbnail

Where AI avatars are at your service 24/7

Collaboration 2.0

In South Korea, DeepBrain AI's hyper-realistic avatars are playing a variety of roles - store clerk, bank teller, tutor, even financial analyst. Exactly how is that working out so far?

98
article thumbnail

Self Service+: Empowering Productivity and Security through a Unified App Experience

Jamf

Truly delighting end users with genuinely helpful apps tailored to their needs is the focus of Sam Allcock, Director of Product Management and Kyle Hammond, Principal Software Engineer at Jamf at JNUC 2024.

article thumbnail

The Samsung tablet I most recommend is not a flagship - and it's still available for sale for October Prime Day

Collaboration 2.0

The Galaxy Tab S9 FE and S9 FE+ are excellent large-screen tablets for work and play. During Amazon's post-Big Deal Days sales event, you can buy the Galaxy Tab S9 FE+ for over $80 off.

Sales 75
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

How and When to Responsibly Dispose of Healthcare Documents

Record Nations

Today, effective management and disposal of healthcare documents are vital. They ensure efficiency, compliance, and data security in healthcare. Healthcare facilities manage vast amounts of sensitive data, including patient records and billing documents. As facilities grow, so do their document archives. That’s why it’s essential to regularly review, organize, and dispose of outdated or unnecessary.

article thumbnail

Top Best Buy deals for October Prime Day 2024: Still available

Collaboration 2.0

Best Buy's 48-hour Flash Sale took place this week (Oct. 8-9), rivaling October Prime Day. While the big box retailer's sale is over, you can still score deals on TVs, laptops, appliances, and more.

Retail 75
article thumbnail

The Importance of Data Fidelity in Healthcare and How to Achieve it

Record Nations

The current healthcare landscape requires facilities to create and store more data than ever before. The enormous amount of patient health records, diagnostic imaging, and lab results involved in the average day can be overwhelming. This data could collectively transform care delivery, but it’s also a challenge to manage effectively. One of the most pressing.

IT 40
article thumbnail

The best QLED TV I've tested isn't from Samsung or LG, and it's still available for $500 off at Amazon

Collaboration 2.0

The TCL QM8 delivers excellent picture quality, great sound, and a dedicated picture mode at an affordable price. Right now, during the post-Prime Day sale, you can get the 65-inch model for just $1,000 on Amazon.

Sales 75
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Digitech Systems Launches Next-Gen Information Management

Info Source

Sys.tm ® Ends File Frustration and Digital Chaos Greenwood Village, CO– October 2, 2024 –As the pace of business becomes more frantic, companies are working harder than ever to manage and secure their business information. Many are falling behind. Today, Digitech Systems announced the availability of Sys.tm , a flexible information management platform for digital transformation and office automation that allows users to effectively manage files, share documents, and secure data.

ECM 40
article thumbnail

Jackery's updated solar generator boasts better battery and massive price cut

Collaboration 2.0

Right now, you can save up to $900 on the Explorer 2000 v2. Jackery's compact LiFePO4-powered backup power unit is perfect for in-home use, camping, and outdoor work tasks.

75
article thumbnail

What’s next for Kodak Alaris after Kingswood Capital acquisition?

Info Source

By Ralph Gammon, Senior Analyst at Infosource Kodak Alaris, a global leader in document scanners and Capture software, has been acquired by Los Angeles-based private equity firm, Kingswood Capital. The deal is the culmination of an initiative to sell the business, announced by the UK’s Pension Protection Fund (PPF) in April 2023. Kingswood, which recently raised a $1.5 billion fund and now has more than $3.2 billion in total assets under its management, focuses on buyouts of middle-market busi

Sales 40