Thu.May 13, 2021

article thumbnail

Biden Signs Sweeping Executive Order on Cybersecurity

Data Breach Today

Order Emphasizes Partnerships, IT Modernization and Supply Chain Security President Joe Biden signed an extensive executive order Wednesday, detailing the government's plan to increase cybersecurity protection across the public and private sectors, as well as securing the nation's infrastructure against the type of attack that targeted SolarWinds and its customers.

article thumbnail

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

In a day and age when the prime directive for many organizations is to seek digital agility above all else, cool new apps get conceived, assembled and deployed at breakneck speed. Related: DHS instigates 60-day cybersecurity sprints. Software developers are king of the hill; they are the deeply-committed disciples pursuing wide open, highly dynamic creative processes set forth in the gospels of DevOps and CI/CD.

Security 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Colonial Restarts Operations Following Ransomware Attack

Data Breach Today

Company Says It Will Take Several Days for Supply Chain to Return to Normal Colonial Pipeline on Wednesday announced that the company had restarted its operations following a ransomware attack last week. The firm still says it will take several days for its supply chain operations to return to normal.

article thumbnail

[Podcast] The Art of the Possible

AIIM

The phrase " the art of the possible " can mean different things to different people. For those of us in the information management business, it has come to mean "achieving what we can (possible), rather than what we want (often impossible)." For me, it's an optimistic view of the future rather than a fearful acknowledgment of our challenges and difficulties.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Colonial Pipeline Restarts Operations Following Attack

Data Breach Today

Company Says It Will Take Several Days to Restore Supply Chain Colonial Pipeline Co. announced Wednesday that it had restarted its operations following a ransomware attack last Friday. The company says it will take several days to restore all of its supply chain operations.

More Trending

article thumbnail

Why a Lab Launched a Vulnerability Disclosure Program

Data Breach Today

A recently launched vulnerability disclosure program is a critical component of Toronto-based LifeLabs' efforts to bolster the security of its medical diagnostic laboratory services and online technologies used by healthcare providers across Canada, says the company's CISO, Mike Melo.

Security 233
article thumbnail

Colonial Pipeline Shells Out $5M in Extortion Payout, Report

Threatpost

According to news reports, Colonial Pipeline paid the cybergang known as DarkSide the ransom it demanded in return for a decryption key.

IT 123
article thumbnail

Biden's Cybersecurity Executive Order: 4 Key Takeaways

Data Breach Today

White House Puts Focus on 'Zero Trust,' Software Standards, Information Sharing By issuing a sweeping cybersecurity executive order on Wednesday, the Biden administration is attempting to take a critical step to address security issues that have come to light after recent cyberattacks. Here's an analysis of the order's key elements.

article thumbnail

New York City Council Passes Tenant Data Privacy Act

Hunton Privacy

On April 29, 2021, the New York City Council passed the Tenant Data Privacy Act (“TDPA”), which would regulate the collection, use, safeguarding and retention of tenant data by owners of “smart access” buildings. The TDPA has been sent to the New York City Mayor’s desk for signature. As defined in the TDPA, a “smart access” building is one that uses keyless entry systems, including electronic or computerized technology ( e.g. , a key fob), RFID cards, mobile apps, biometric information or other

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Colonial Pipeline Attack: 'We're Simply Unprepared'

Data Breach Today

CISO Bernie Cowens on Mitigating the Vulnerabilities of Critical Infrastructure Facilities As former CISO of Pacific Gas & Electric, Bernie Cowens knows plenty about cybersecuring the nation's critical infrastructure. He shares his informed opinion on the Colonial Pipeline ransomware attack and what public and private sector entities must do to shore up key defenses.

article thumbnail

Critical Infrastructure Protection: Physical and Cyber Security Both Matter

eSecurity Planet

Oil and gas companies have two key areas of concern when addressing cybersecurity, especially in their unmanned remote facilities. They have to supply physical security that denies access to the cyber-physical assets, and they sometimes must employ several cyber defenses depending on the device or system in question. So when you are looking at doing a Zero Trust deployment for critical infrastructure, it is important to be mindful of the fact that a site’s physical security is typically th

Security 103
article thumbnail

Biden: Russian Government Not Behind Colonial Pipeline Attack

Data Breach Today

But President Says Attackers Reside in Russia President Joe Biden says the Russian government was not behind the ransomware attack that struck Colonial Pipeline Co. May 7, but he said attackers living in Russia were involved.

article thumbnail

When AI Becomes the Hacker

Dark Reading

Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

12 cyber security questions to ask your CISO

IT Governance

Cyber security affects companies of all sizes in all sectors. Moreover, threats are constantly evolving and your legal and regulatory requirements have become major issues – particularly with the introduction of the the GDPR (General Data Protection Regulation) and NIS Directive. All of this means that regular communication between management and the board regarding cyber security is more important than ever.

article thumbnail

Thales is part of the Gartner Peer Insights Customer First program for Access Management

Thales Cloud Protection & Licensing

Thales is part of the Gartner Peer Insights Customer First program for Access Management. madhav. Thu, 05/13/2021 - 09:06. Thales is excited to announce that we have pledged to be a Customer First vendor in the Access Man-agement market for our SafeNet Trusted Access series of products. Our team at Thales takes great pride in this program commitment, as customer feedback continues to be a critical priority, and shapes our products and services.

Access 87
article thumbnail

Biden signed executive order to improve the Nation’s Cybersecurity

Security Affairs

President Joe Biden signed an ambitious executive order to dramatically improve the security of the US government networks. President Biden signed an executive order this week to improve the country’s defenses against cyberattacks, it is an important move that comes shortly after the recent wave of attacks, such as the SolarWinds supply chain attack and the Colonial Pipeline attack. “The United States faces persistent and increasingly sophisticated malicious cyber campaigns that thr

article thumbnail

Piracy in the pandemic – the impact of Covid 19 on unlicensed software usage

Thales Cloud Protection & Licensing

Piracy in the pandemic – the impact of Covid 19 on unlicensed software usage. jstewart. Thu, 05/13/2021 - 18:57. The year 2020 permanently changed the world in many ways. One of the most significant effects was the need for companies across many industries to shift to a remote working model. With so many employees accessing corporate networks and systems remotely, software piracy has become another security threat that businesses need to face.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Organizations in aerospace and travel sectors under attack, Microsoft warns

Security Affairs

Microsoft warns of a malware-based campaign that targeted organizations in the aerospace and travel sectors in the past months. Microsoft researchers revealed that organizations in the aerospace and travel sectors have been targeted in the past months in a malware-based campaign. Threat actors conducted a spear-phishing campaign using messages that were specifically designed to be of interest to the targeted organizations.

article thumbnail

Five Critical Password Security Rules Your Employees Are Ignoring

Threatpost

According to Keeper Security’s Workplace Password Malpractice Report, many remote workers aren’t following best practices for password security.

article thumbnail

Risky Business Aging critical infrastructure networks and advanced attacks

Thales Cloud Protection & Licensing

Risky Business Aging critical infrastructure networks and advanced attacks. madhav. Thu, 05/13/2021 - 08:34. The most recent attack on a top U.S. fuel pipeline operator offered an unwelcome illustration of just how vulnerable key supply lines can be. Operating the country’s largest refined products pipeline, Colonial Pipeline was brought to its knees over the weekend by a ransomware attack by cybercriminal gang, DarkSide.

article thumbnail

Fresh Loader Targets Aviation Victims with Spy RATs

Threatpost

The campaign is harvesting screenshots, keystrokes, credentials, webcam feeds, browser and clipboard data and more, with RevengeRAT or AsyncRAT payloads.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential

Dark Reading

Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.

article thumbnail

Apple’s ‘Find My’ Network Exploited via Bluetooth

Threatpost

The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers.

IoT 92
article thumbnail

Decades-Old 'Frag Attack' Flaws Affect Almost Every Wi-Fi Device

WIRED Threat Level

The so-called Frag Attack vulnerabilities could let hackers steal data or compromise connected gadgets.

Security 100
article thumbnail

Ransomware Going for $4K on the Cyber-Underground

Threatpost

An analysis of three popular forums used by ransomware operators reveals a complex ecosystem with many partnerships.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

GameStop FOMO Inspires a New Wave of Crypto Pump-and-Dumps

WIRED Threat Level

Thousands of would-be investors are joining Discord groups that promise big earnings by manipulating the crypto market.

article thumbnail

Defending the Castle: How World History Can Teach Cybersecurity a Lesson

Dark Reading

Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended.

article thumbnail

The Best Personal Safety Devices, Apps, and Alarms

WIRED Threat Level

Your smartphone or wearable could help you out in a truly dangerous situation. Here are some options to consider.