Thu.Dec 26, 2019

article thumbnail

The California Consumer Privacy Act is upon us. Who is ready?

Information Management Resources

Technology companies have significant work to do as they head into the new year and the demands of regulatory compliance for customer data become real.

Privacy 64
article thumbnail

Combining AI and Playbooks to Predict Cyberattacks

Threatpost

Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker's next move.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Honoring' CCPA's Binding Principles Nationally Won't Be Easy

Dark Reading

Even companies with the reach, capital, and innovative capacity of Microsoft or Google will struggle to adhere to the tenets of California's new consumer privacy law.

Privacy 62
article thumbnail

The Decade Big-Money Email Scams Took Over

WIRED Threat Level

In the last few years, the "Nigerian prince" scams have gotten a major upgrade.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Researchers: Chinese APT Espionage Campaign Bypasses 2FA

Data Breach Today

Fox-IT Suspects APT20 Group Was Involved An advanced persistent threat espionage campaign with suspected ties to the Chinese government quietly targeted businesses and governments in 10 countries for two years, bypassing two-factor authentication, according to a report by Fox-IT.

More Trending

article thumbnail

Managing Open Source Components

Data Breach Today

BNP Paribas' Patrick Pitchappa on Application Security Because open source components have known vulnerabilities, it's important for companies to invest in the right tools to help developers build the right applications, says Patrick Pitchappa of BNP Paribas banking group.

Security 147
article thumbnail

Cloud, Intelligent Content Services, and Digital Fragility: What’s on the RIM Horizon for 2020

ARMA International

Highlights of the Forrester Research and ARMA International Records Management Online Survey, Q4 2019. 2019 marks ten years since ARMA International and Forrester Research first surveyed records and information management (RIM) decision-makers to understand the key trends and challenges facing the profession. Dozens of respondents from around the world shared their perspectives in the survey that ran in September-October 2019.

article thumbnail

Managing Third-Party Risks: CISO Insights

Data Breach Today

TMF Group's Devender Kumar on Effectively Handling Vendor Risk It's important to look into the inherent risks of engaging with vendors before getting into assessing individual companies, says Devender Kumar, CISO at TMF Group, who discusses how to handle risks arising from third parties.

Risk 147
article thumbnail

EU Council’s Draft Position on the Application of the GDPR

Hunton Privacy

On December 19, 2019, the members of the Permanent Representations of EU Member States to the Council of the European Union (“the Council”) published a draft position on the application of the General Data Protection Regulation (“GDPR”). After the draft position has been formally adopted by the Council, it will be provided to the European Commission.

GDPR 72
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ingredients of an Incident Response Playbook

Data Breach Today

Anish Ravindranathan of General Mills on How His Team Responds to Attacks Building a good incident response plan requires analytical skills, says Anish Ravindranathan, lead, cybersecurity detection and response, at General Mills, who offers insights on creating a playbook.

Analytics 147
article thumbnail

Experts warn of 5 new flaws in Google Chrome dubbed Magellan 2.0

Security Affairs

Google addressed a new set of vulnerabilities, dubbed Magellan 2.0, that could be exploited for remote code execution inside the Chrome browser. Google has fixed five SQLite vulnerabilities, dubbed Magellan 2.0, that could be exploited by an attacker to remotely execute malicious code inside the Chrome browser. The vulnerabilities were discovered by researchers from the Tencent Blade security team.

IoT 64
article thumbnail

Citrix Vulnerability Could Affect 80,000 Companies: Report

Data Breach Today

Positive Technologies: Potential Risks Include DDoS, Phishing and Malware Attacks Researchers at Positive Technologies say they discovered a vulnerability in enterprise software offerings from Citrix that potentially could put 80,000 companies in 158 countries at risk of a cyberattack.

Phishing 147
article thumbnail

Top 10 Breaches and Leaky Server Screw Ups of 2019

Threatpost

2019 was a banner year for data exposures, with billions of people affected by cloud misconfigurations, hacks and poor security practices in general. Here's the Threatpost Top 10 for data-breach news of the year, featuring all the low-lights.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HIPAA Standard 164.312(d): MFA to the Rescue

Data Breach Today

How Common is it for Individuals to Remember PINs or Passwords Set by Entities Holding the Information They're Requesting? Humans have enough things to remember as it is and remembering yet another number or string isn't something anyone looks forward to.

Passwords 113
article thumbnail

Chinese Hackers Bypassing Two-Factor Authentication

Schneier on Security

Interesting story of how a Chinese state-sponsored hacking group is bypassing the RSA SecurID two-factor authentication system. How they did it remains unclear; although, the Fox-IT team has their theory. They said APT20 stole an RSA SecurID software token from a hacked system, which the Chinese actor then used on its computers to generate valid one-time codes and bypass 2FA at will.

article thumbnail

Art Coviello on Misinformation in the Age of Cyber Warfare

Data Breach Today

When he was CEO of RSA, Art Coviello warned global security leaders about cyber warfare among nation-states. What he didn't anticipate was how quickly social media would rise, enabling adversaries to weaponize misinformation. How does this impact his 2020 outlook?

Security 113
article thumbnail

Ryuk Ransomware evolution avoid encrypting Linux folders

Security Affairs

Experts spotted a new strain of the Ryuk Ransomware that was developed to avoid encrypting folders commonly seen in *NIX operating systems. Recently the City of New Orleans was the victim of ransomware attack , researchers from the BleepingComputer community revealed that the malware that infected the City’s systems was the Ryuk Ransomware. The experts found on the infected systems an executable named v2.exe.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Year of Magecart: How the E-Commerce Raiders Reigned in 2019

Dark Reading

Breaching British Airways, Ticketmaster, and Macy's, Magecart attack groups sharply rose in sophistication and pervasiveness this year -- and show no signs of slowing down.

59
article thumbnail

OCR’s Second Settlement Under HIPAA Right of Access Initiative

Hunton Privacy

On December 12, 2019, the U.S. Department of Health and Human Services’ (“HHS”) Office for Civil Rights (“OCR”) announced its second enforcement action and settlement under its HIPAA Right of Access Initiative. Under the terms of the settlement, Korunda Medical, LLC, agreed to pay $85,000 to settle a potential violation of HIPAA’s right of access. According to HHS, “Korunda is a Florida-based company that provides comprehensive primary care and interventional pain management to approximately 2,0

Access 53
article thumbnail

Ransomware Situation Goes From Bad to Worse

Dark Reading

New malware distribution techniques and functionality updates are sure to put more pressure on enterprise organizations in 2020.

article thumbnail

Technologists upbeat about AI's impact on their careers, but not on society

Information Management Resources

Artificial intelligence will shape the technology landscape of the 2020s, but unintended consequences pose big risks, according to a new report from the ISACA.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Critical Citrix Bug Puts 80,000 Corporate LANs at Risk

Threatpost

The flaw resides in the Citrix Application Delivery Controller and Gateway.

Risk 67
article thumbnail

4 trends that will impact how businesses focus on data in 2020

Information Management Resources

With a New Year comes new data regulations and more sophisticated security attacks. Data will not only be at the forefront of IT teams but the entire C-level executive team.

article thumbnail

Spotlight Podcast: Building Resilience into the IoT with Rob Spiger

The Security Ledger

In this Spotlight edition of the Security Ledger Podcast, sponsored by Trusted Computing Group*: we're joined by Rob Spiger, a principal security strategist at Microsoft and co-chair of the cyber resilient technologies working group at Trusted Computing Group. Rob talks to us about efforts to make more resilient connected devices and how the. Read the whole entry. » Related Stories Spotlight Podcast: Two Decades On, Trusted Computing Group tackles IoT Insecurity Spotlight Podcast: RSA CTO Z

IoT 40
article thumbnail

Federal Data Strategy 2020 Action Plan

National Archives Records Express

We are pleased to announce the Federal Data Strategy 2020 Action Plan has been released! The Federal Records Act governs the lifecycle of data when created and used in the same context of a Federal record. As such, NARA is engaged with the Federal Data Strategy Team to ensure records management is considered where applicable in this government-wide initiative.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Keeping remote workers engaged and productive

DXC Technology

When it comes to working remotely, most enterprise leaders and employees usually have pretty strong opinions that fall along familiar lines of argument. For example: Pro: Working remotely allows employees more flexibility to do their jobs when and where they want, resulting in higher productivity and job satisfaction. Con: Remote workers can become disconnected and […].

IT 9
article thumbnail

IG World Top Articles in 2019

IG Guru

Below are the top articles from IG World Magazine in 2019 The announcement of the Information Governance 2nd. Edition from Wiley published by Robert Smallwood and experts. The Data Luminary – Dennis Kessler of the European Bank Privacy Concerns Hit Main Street America Blockchain in Healthcare – Empowering Patients and Professionals What is Master Data […].