Fri.Dec 06, 2019

article thumbnail

Don't forget the basics: KYE means KYC

Data Breach Today

Know your enemy: How banks can identify and beat the evolving threat of financial crime "We can see criminals are moving up the financial value chain from attacking lots of targets with smaller rewards to smaller numbers of targets with higher rewards," says Ho.

147
147
article thumbnail

7 top data security threats for 2020, and what to do about them

Information Management Resources

Even though the threats coming at you won’t be any less intense, complicated or difficult to manage, 2020 will be the year of simplified security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s Cybersecurity Centre, ICANN, and other notable security experts. Although, the topic has gained popularity amongst CIOs and CISOs, most companies are still overlooking important security blind spots when it comes to securing their digital assets outside the enterprise firewalls—domains, DNS, digital certificates.

Security 135
article thumbnail

Success Enablers or Silent Killers?

Dark Reading

These five success enablers will help CISOs report, measure, and demonstrate ROI to the C-suite.

40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Two Russians Indicted Over $100M Dridex Malware Thefts

Data Breach Today

Russia's FSB Security Service Now Employs One Suspect, Authorities Allege Two Russian men have been charged with stealing more than $100 million from banks around the world using the notorious Dridex malware, according to an unsealed U.S. indictment that caps off a decade-long investigation led by American and British law enforcement agencies.

Security 214

More Trending

article thumbnail

How to Make a Security Transformation

Data Breach Today

RSA's Ganesh Prasad on Understanding Risk Exposure in a Digital Transformation A successful digital transformation journey must include a security transformation journey that includes a careful examination of risks, says Ganesh Prasad of RSA.

article thumbnail

Mega Breaches Are Forcing Us to a Passwordless World. Are We Finally Ready?

Dark Reading

Passwordless authentication advocates see 2020 as a potential turning point year for the technology. But can the industry get off the dime?

article thumbnail

Balancing Digital Transformation and Security

Data Breach Today

Kaspersky's Claire Hatcher Describes a Layered Approach As companies go through a digital transformation, they should keep security top of mind, says Claire Hatcher of Kaspersky, who describes a layered approach.

article thumbnail

Federal Banking Agencies Release Joint Statement on Use of Alternative Data for Credit Underwriting

Data Matters

On December 3, 2019, the five federal banking agencies 1 issued a joint statement (the “Joint Statement”) regarding the use of alternative data for credit underwriting. The Agencies highlighted potential benefits that may arise from the use of alternative data, including the ability to make faster and more accurate credit determinations and the potential to provide credit at a lower rate or to individuals or small businesses that would otherwise be unable to access it.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Misconceptions About 'Zero Trust'

Data Breach Today

Forescout's Steven Hunter on How to Ensure Successful Deployment A common misconception about the "zero trust" model is that once it's deployed, network security is no longer required, says Steven Hunter of Forescout.

Security 147
article thumbnail

Federal Banking Agencies Release Joint Statement on Use of Alternative Data for Credit Underwriting

Data Matters

On December 3, 2019, the five federal banking agencies 1 issued a joint statement (the “Joint Statement”) regarding the use of alternative data for credit underwriting. The Agencies highlighted potential benefits that may arise from the use of alternative data, including the ability to make faster and more accurate credit determinations and the potential to provide credit at a lower rate or to individuals or small businesses that would otherwise be unable to access it.

article thumbnail

OnDemand Webinar | Using Security Ratings to Achieve Security Goals

Data Breach Today

How Ratings Can Be Leveraged To Improve Security Performance And Vendor Risk Management Watch this OnDemand webinar and learn how ratings be leveraged to improve security performance and vendor risk management.

Security 147
article thumbnail

VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competition

Security Affairs

VMware has addressed a critical remote code execution vulnerability in ESXi that was disclosed recently at the Tianfu Cup hacking competition. This week VMware has released security updates that fix a critical remote code execution vulnerability in ESXi that was recently disclosed by white hat hackers at the Tianfu Cup hacking competition in China. The Tianfu Cup 2019 International Cyber ??

Cloud 64
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How the Adversarial Mindset Is Making Cybersecurity Better

Data Breach Today

Applying offensive hacking expertise and a more adversarial mindset to better hone not just network defenses but also public policy is proving effective, says Jeff Moss, founder and creator of the Black Hat conference.

article thumbnail

Now Available: CCPA Update (Webinar Materials)

HL Chronicle of Data Protection

Mark Brennan. Tim Tobin. With the California Consumer Privacy Act’s (CCPA) effective date fast approaching on January 1, 2020 and the California Attorney General’s CCPA rule-making still pending, covered businesses have important decisions to make in the very near future. In this webinar discussion from November 14, Hogan Lovells Privacy and Cybersecurity partners Mark Brennan and Tim Tobin discussed how the CCPA changes enacted over the past year and the proposed regulations may impact your

Privacy 59
article thumbnail

AI, Machine Learning and Robotics: Privacy, Security Issues

Data Breach Today

The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu.

article thumbnail

Stealthy MacOS Malware Tied to Lazarus APT

Threatpost

Researcher discovered a MacOS trojan hiding behind a fake crypto trading platform believed to be the work of the state-sponsored North Korean hackers behind WannaCry.

60
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Analysis: Smart TV Risks

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of the FBI's security and privacy warnings about smart TVs. Also featured: discussions on the security of connected medical devices and strategies for fighting synthetic identity fraud.

Risk 113
article thumbnail

Linux Bug Opens Most VPNs to Hijacking

Threatpost

In a coffee-shop scenario, attackers can hijack "secure" VPN sessions of those working remotely, injecting data into their TCP streams.

article thumbnail

IT Security Outlook 2020: The Security Arms Race Escalates

eSecurity Planet

Sophisticated cyberattacks will be met with innovative solutions from security vendors, and CCPA will keep compliance issues in the forefront.

article thumbnail

Are You Ready For The Holiday Card Fraud Rush?

Rippleshot

The uptick in holiday shopping card fraud leaves financial institutions in a tough position: Manage the fallout from higher declines or take on additional fraud risk to minimize cardholder disruption. Getting proactive about holiday card fraud can alleviate that burden. To help you keep your cardholders protected, we've brought back our team's tips on how to manage incidents during this peak fraud season.

Risk 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Now Available: CCPA Update (Webinar Materials)

HL Chronicle of Data Protection

Mark Brennan. Tim Tobin. With the California Consumer Privacy Act’s (CCPA) effective date fast approaching on January 1, 2020 and the California Attorney General’s CCPA rule-making still pending, covered businesses have important decisions to make in the very near future. In this webinar discussion from November 14, Hogan Lovells Privacy and Cybersecurity partners Mark Brennan and Tim Tobin discussed how the CCPA changes enacted over the past year and the proposed regulations may impact your

Privacy 52
article thumbnail

FTC Issues Opinion and Order Against Cambridge Analytica For Deceiving Consumers About the Collection of Facebook Data, Compliance with EU-U.S. Privacy Shield

Information Governance Perspectives

The Federal Trade Commission issued an Opinion finding that the data analytics and consulting company Cambridge Analytica, LLC engaged in deceptive practices to harvest personal information from tens of millions of Facebook users for voter profiling and targeting. The Opinion also found that Cambridge Analytica engaged in deceptive practices relating to its participation in the Continue reading.

article thumbnail

Facebook Alleges Company Infiltrated Thousands for Ad Fraud

Threatpost

Facebook has paid over $4 million to victims to reimburse them for the unauthorized ads purchased using their ad accounts.

article thumbnail

Four Companies Settle FTC Allegations Related to Privacy Shield Misrepresentations

Hunton Privacy

On December 3, 2019, the Federal Trade Commission announced that it had reached settlements in four separate Privacy Shield cases. Specifically, the FTC alleged that Click Labs, Inc., Incentive Services, Inc., Global Data Vault, LLC, and TDARX, Inc. each falsely claimed to participate in the EU-U.S. Privacy Shield framework. The FTC also alleged that Click Labs and Incentive Services falsely claimed to participate in the Swiss-U.S.

Privacy 49
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Feds Crack Down on Money Mules, Warn of BEC Scams

Threatpost

Authorities say they have halted over 600 domestic money mules – exceeding the 400 money mules stopped last year.

article thumbnail

Andy Ellis on Risk Assessment

Schneier on Security

Andy Ellis, the CSO of Akamai, gave a great talk about the psychology of risk at the Business of Software conference this year. I've written about this before. One quote: "The problem is our brains are intuitively suited to the sorts of risk management decisions endemic to living in small family groups in the East African highlands in 100,000 BC, and not to living in the New York City of 2008.".

Risk 59
article thumbnail

Recent events at the Innovation Hub

Archives Blogs

Since the Innovation Hub opened in July 2015, many visitors and volunteers have passed through its doors to scan documents from our holdings, attend presentations and conferences, and participate in brainstorming sessions as well as scanathons and editathons. The Innovation Hub accomplishes an important part of NARA’s mission to make access happen through digitization, and also serves as an important event space to bring together both internal and external stakeholders for collaborative ac