Mon.Nov 04, 2019

Data Ethics – The Profound Impacts of New Technology

Perficient Data & Analytics

Data ethics and security have been around a long time – as long as data. Constantly evolving. But, continued tech advancement has made a profound impact. So, data security and data ethics is more important than ever. Magnified Relevance. Tech has enabled an exponential increase of data.

Eye Clinic Notifies Thousands About 2018 Breach

Data Breach Today

Patient Portal Incident Involved Third-Party Vendor A Utah eye clinic began notifying thousands of patients last week about a 2018 breach involving a third-party portal provider. What should other healthcare organizations learn from this incident

130
130

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

The Last Watchdog

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live.

Chinese APT Group Targets Mobile Networks: FireEye Mandiant

Data Breach Today

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

The Last Watchdog

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools at their beck and call. Yet the majority feel unsatisfied with narrow daily assignments and increasingly disconnected from the strategic goals of their parent organization.

B2B 100

More Trending

Four ways to modernize your supply chain

OpenText Information Management

It’s no secret that supply chains are becoming increasingly strategic and complex. Whatever the size of your business, having a well-functioning supply chain is critical to your organization’s success.

IT 52

Ransomware Gangs' Not-So-Secret Attack Vector: RDP Exploits

Data Breach Today

But RDP Attack Overuse Leads Other Hackers Back to Botnets, Researchers Find Many ransomware-wielding attackers continue to hack into organizations via remote desktop protocol.

Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files

Security Affairs

Researchers found serious flaws in Investintech’s Able2Extract Professional tool that could be exploited to execute arbitrary code using specially crafted image files.

IT 52

ICO: UK Police Should Go Slow on Facial Recognition

Data Breach Today

Commissioner Elizabeth Denham Also Calls for Creating a 'Code of Practice' Elizabeth Denham, the U.K.'s s chief privacy watchdog, is urging police to go slow when it comes to using live facial recognition.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

New Gartner reports provide essential insight into evolving Content Services landscape

OpenText Information Management

Norsk Hydro Breach: Update on Insurance Coverage

Data Breach Today

So Far, Insurance Has Paid $3.6 Million, But More Anticipated So far, Norweigan aluminum company Norsk Hydro has received just $3.6

How AI is helping to rethink citizen services

OpenText Information Management

Everyone knows what it’s like to deal with a government contact center: listening to recorded messages and being pushed from pillar to post without any resolution.

BlueKeep Attacks Arrive, Bearing Cryptomining Malware

Data Breach Today

Exploit Isn't a Worm, but Experts Remain Braced for Mayhem The cybersecurity community had been holding its breath in anticipation of mass attacks targeting the severe BlueKeep vulnerability in Windows, which Microsoft has patched.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Everis and Spain’s radio network Cadena SER hit by ransomware

Security Affairs

NTT DATA-owned firm Everis? is one of Spain’s largest managed service providers (MSP), it has suffered a ransomware attack, and it was not the only case.

How to alleviate supply chain pain points

OpenText Information Management

Imagine this: you get home on a Friday evening and start to order pizza, only to find out they are out of mushrooms and jalapeno peppers. Why, you ask? Because the delivery truck was stranded overnight.

B2B 52

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

WIRED Threat Level

By pointing lasers tuned to a precise frequency at a smart assistant, researchers could force it to unlock cars, open garage doors, and more. Security Security / Cyberattacks and Hacks

IT 52

Top Application Security Products

eSecurity Planet

Application security is a widespread problem. These security tools can help find and fix application vulnerabilities before hackers exploit them

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

GitLab plans to ban hires in China and Russia due to espionage concerns

Security Affairs

The popular code hosting platform GitLab is considering to block new hires from China and Russia due to espionage concerns. GitLab is a popular code hosting platform GitLab that is currently used by several major tech companies including IBM, Sony, NASA, Alibaba, Oracle, Invincea, Boeing, and SpaceX.

Addressing the skills shortage in security

OpenText Information Management

Cybersecurity incidents currently represent one of the biggest threats to organizations.

Summary – “Retention of Accounting Records:  A Global Survey of Laws and Regulations”

ARMA International

This article summarizes a report published by AIEF on June 3, 2019. Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November.

Ocala City in Florida lost $742,000 following BEC attack

Security Affairs

Business email compromise scam (BEC) continues to target organizations worldwide, crooks stole $742,000 from Ocala City in Florida.

IT 52

ARMA International & NetGovern to Launch Definitive Benchmarking of Information Governance Programs via ARMA

IG Guru

Right before the conference ARMA announced a new benchmarking initiative for IG programs with NetGovern. Read the announcement on ARMA or PRNewswire. The post ARMA International & NetGovern to Launch Definitive Benchmarking of Information Governance Programs via ARMA appeared first on IG GURU.

Homemade TEMPEST Receiver

Schneier on Security

Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest programs and listen to what their own -- and their neighbors' -- electronic devices are doing.

QSnatch malware already infected thousands of QNAP NAS devices

Security Affairs

Security experts warn of a new piece of malware dubbed QSnatch that already infected thousands of QNAP NAS devices worldwide. A new piece of malware dubbed QSnatch is infecting thousands of NAS devices manufactured by the Taiwanese vendor QNAP.

Website Cookie Consent: Is the Cookie Starting to Crumble?

Data Matters

Two important decisions have recently occurred relating to website operators’ use of cookies.

Two unpatched RCE flaws in rConfig software expose servers to hack

Security Affairs

The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched.

‘Human-friendly’ organizations will thrive in the digital age

DXC Technology

Automation and intelligent machines are an increasing presence in the workplace, yet organizations still need humans as much as ever to engage with customers, make business decisions, manage supply chains, do community outreach, and more. Indeed, there is a growing awareness in the enterprise world that successful organizations must strive to be as “human-friendly” as […].

40