Mon.Aug 01, 2022

Maintaining Momentum in Your Security Strategy

Data Breach Today

Glen Hymers of UK Cabinet Office on Keeping Communication Relevant Cybersecurity practitioners have gained the attention of corporate boards, but that attention must be converted into momentum, says Glen Hymers, head of Data Privacy and Compliance at the U.K. Cabinet Office.

Q&A: Here’s how the ‘Matter’ protocol will soon reduce vulnerabilities in smart home devices

The Last Watchdog

After years of competitive jockeying, the leading tech giants have agreed to embrace a brand new open-source standard – called Matter – that will allow consumers to mix and match smart home devices and platforms. Related: The crucial role of ‘Digital Trust’ After numerous delays and course changes, the Matter protocol, is set to roll out this fall, in time for the 2022 holiday shopping season.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tracking Ransomware: Here's Everything We Still Don’t Know

Data Breach Today

Known Unknowns Include Count of Victims and Ransoms Paid, Criminal Profits and More How many organizations fall victim to a ransomware outbreak? How many victims pay a ransom? How many victims see stolen data get leaked?

You Need a Password Manager. Here Are the Best Ones

WIRED Threat Level

Keep your logins locked down with our favorite apps for PC, Mac, Android, iPhone, and web browsers. Security Gear Gear / Buying Guides Security / Security Advice

Build Your Open Data Lakehouse on Apache Iceberg

Speaker: Veena Vasudevan and Jason Hughes

In this webinar, Dremio and AWS will discuss the most common challenges in data architecture and how to overcome them with an open data lakehouse architecture on AWS. Sign up now!

Check Point Execs: Supply Chain Woes Will Persist Into 2023

Data Breach Today

Check Point Beats Q2 Earnings Forecast Despite Spike in Materials, Shipping Costs Continued supply chain costs dampened an otherwise positive Q2 earnings report for Check Point.

More Trending

Weary Cybercriminals Turn to Cryptojacking Banks: Report

Data Breach Today

Crackdown on Ransomware has Operators Seeking Alternatives Hackers are turning to cryptojacking to make easy money despite the fall in cryptocurrency valuation, including ransomware cybercriminals attracted by the lower stakes world of cryptojacking, says threat intelligence firm SonicWall.

For Big Tech, Neutrality Is Not an Option — and Never Really Was

Dark Reading

Tech companies play a vital role in global communication, which has profound effects on how politics, policies, and human rights issues play out

Two Vendor Hacks Affect Nearly 1.5 Million and Counting

Data Breach Today

The Business Associates Also List Dozens of Affected Covered Entity Clients Two hacking incidents involving vendors providing important IT-related and other services to dozens of covered entity clients are among the latest breaches affecting hundreds of thousands of individuals' data

ALPHV/BlackCat ransomware gang claims to have stolen data from Creos Luxembourg S.A.

Security Affairs

The ALPHV/BlackCat ransomware gang claims to have breached the European gas pipeline Creos Luxembourg S.A. The ALPHV/BlackCat ransomware gang claims to have hacked the European gas pipeline Creos Luxembourg S.A. Creos Luxembourg S.A.

The Ultimate Guide to Hardening Windows Servers

IT Professional looking to harden your servers? ThreatLocker’s got you covered. The Ultimate Guide to Hardening Windows Servers offers tips and best practices to help mitigate cyber threats, better protect your servers, and secure your endpoints. Download today!

Should US Banks Do More to Reduce APP Fraud?

Data Breach Today

Ken Palla Discusses New Guidance From the Bureau of Consumer Financial Protection The US Consumer Financial Protection Bureau reportedly plans to release new guidance requiring banks to reimburse consumers for certain money-transfer service scams.

Credential Canaries Create Minefield for Attackers

Dark Reading

Canary tokens — also known as honey tokens — force attackers to second-guess their potential good fortune when they come across user and application secrets

93

Ring Gives Videos to Police without a Warrant or User Consent

Schneier on Security

Amazon has revealed that it gives police videos from its Ring doorbells without a warrant and without user consent. Ring recently revealed how often the answer to that question has been yes. The Amazon company responded to an inquiry from US Senator Ed Markey (D-Mass.),

Name That Edge Toon: Up a Tree

Dark Reading

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card

92

Data Value Scorecard Report

This report examines the quantitative research of data leaders on data value and return on investment.

Australian man charged with creating and selling the Imminent Monitor spyware

Security Affairs

An Australian national has been charged for the creation and sale of the Imminent Monitor (IM) spyware, which was also used for criminal purposes.

Sales 89

List of Data Breaches and Cyber Attacks in July 2022 – 99.2 Million Records Breached

IT Governance

Welcome to our July 2022 review of data breaches and cyber attacks. We identified 85 security incidents during the month, resulting in 99,243,757 compromised records. You can find the full list below, broken into categories.

Release of Annual Records Management Report

National Archives Records Express

We are pleased to announce the publication of NARA’s Federal Agency Records Management Annual Report, 2021. This consolidated report provides a summary analysis of the state of records management programs across the federal government.

A Widespread, Multistage Investment Scam

KnowBe4

A complex and ambitious investment scam has used more than 10,000 domains to induce speculators to give up not just funds, but personal information as well. Researchers at security firm Group-IB describe the campaign as one that proceeds through several distinct stages.

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

DoJ: Foreign Adversaries Breach US Federal Court Records

Dark Reading

A Justice Department official testifies to a House committee that the cyberattack is a "significant concern

75

Nominations are Now Open for the 2022 ICRM Awards

IG Guru

The ICRM has many active and accomplished volunteers that work selflessly to give back to the RIM profession. The passion and dedication that our volunteers put into their work is clear; their talent deserves to be widely recognized and rewarded.

IT 73

Ransomware Hit on European Pipeline & Energy Supplier Encevo Linked to BlackCat

Dark Reading

Customers across several European countries are urged to update credentials in the wake of the attack that affected a gas-pipeline operator and power company

The Reporting Line of Security Teams / CISOs – Updated via Risk & Cybersecurity Thoughts from the Field

IG Guru

Check out the article here. Business Compliance IG News information security Blog CISO Leadership Reporting Line Thoughts from the Field

Risk 72

12 Considerations When Evaluating Data Lake Engine Vendors for Analytics and BI

Businesses today compete on their ability to turn big data into essential business insights. Modern enterprises leverage cloud data lakes as the platform used to store data. 57% of the enterprises currently using a data lake cite improved business agility as a benefit.

How to Maintain ISO 27001 Certification: 7 Top Tips

IT Governance

Whether you’re a small organisation with limited resources or an international firm, achieving ISO 27001 certification will be a challenge. Anyone who has already been through the process will know that.

IT 67

Securing Your Move to the Hybrid Cloud

Threatpost

Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments. Cloud Security InfoSec Insider

Cloud 94

Decades of empowering efficient data decisions

IBM Big Data Hub

Data is everywhere. It grows exponentially year by year, and it is our duty to keep up with its overwhelming volume and complexity. The thing is, we’re so focused on conquering our data that we often forget this battle to understand it has been one we’ve been fighting since the beginning of time.

Thales and Palo Alto Networks collaborate to offer mid-markets the enterprise protection

Thales Cloud Protection & Licensing

Thales and Palo Alto Networks collaborate to offer mid-markets the enterprise protection. divya. Tue, 08/02/2022 - 05:05. Combatting Cybersecurity Threats Through Integration.

Cloud 68

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

All the Things That I Learned: Imaging Project

The Texas Record

The following information is based on my experience per my assigned roles on an internship project that consisted of following a Record Management Officer’s (RMO) procedures to convert physical records to electronic, implement consistent and clear file naming systems, and properly dispose of confidential records. I worked coincide with other team members.

The Emerging Trends and Growing Role of AI and Machine Learning in Cybersecurity

Cllax

According to a recent market research analysis, the market for artificial intelligence in cybersecurity will rise at a CAGR of 24.2 percent and reach $66.22 billion by 2029. The market.