Tue.Dec 31, 2019

article thumbnail

Operational Technology: Why Old Networks Need to Learn New Tricks

Dark Reading

Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.

IT 81
article thumbnail

7 Tips for Maximizing Your SOC

Threatpost

Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A CISO's Security Predictions for 2020

Data Breach Today

As Threats Continue to Evolve, So too Must Defenses The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.

Security 147
article thumbnail

5G technology demands could cause a data revolution

Information Management Resources

Although many of the anticipated use cases of 5G are not expected to go mainstream for another two to three years, with an increase in bandwidth and speed, data is only going to become more and more important – and fast.

67
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection from natural disasters, theft, vandalism, and terrorism. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

Risk 136

More Trending

article thumbnail

2020 Cybersecurity Trends to Watch

Threatpost

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

article thumbnail

Report: Cloud Hopper Attacks Affected More MSPs

Data Breach Today

Wall Street Journal Names Companies Affected By Tenacious Chinese Hackers A persistent question over the past several years is which managed service providers were affected by APT10, a tenacious Chinese hacking group. But a Wall Street Journal investigation on Monday has revealed new companies affected by Cloud Hopper attacks.

Cloud 162
article thumbnail

The Best Training for Records Managers

AIIM

In a couple of recent blog posts, we’ve talked about important skills every modern records manager must have right now and the best certifications for records managers. This leads to a logical question – how does a records manager get there? Where do you start? In my role as Director of Professional Development for AIIM, I connect with countless professionals at this same point along their career path where they are asking these same questions.

article thumbnail

Huawei: US Trade Ban Will Make 2020 'Difficult'

Data Breach Today

Company Forging Ahead Even As National Security Concerns Linger In a message to employees, Huawei's rotating Chairman Eric Xu says the company is preparing for a "difficult" 2020 as security concerns over national security and the U.S. trade ban will linger into the new year.

Security 147
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Most Dangerous People on the Internet This Decade

WIRED Threat Level

In the early aughts the internet was less dangerous than it was disruptive. That's changed. .

IT 92
article thumbnail

Chivalric Disorder as Knight and Dame Data Goes Errant

Data Breach Today

British Government Apologizes for New Year's Honors List Recipient Data Breach Human error looks to be the obvious culprit in an accidental data breach by Britain's Cabinet Office, which published the home addresses of celebrities such as Elton John and Olivia Newton-John when it released a list of individuals set to be recognized for their contributions to British society.

article thumbnail

2019: 12 Months of Connecting with Customers

Micro Focus

As is customary with this time of year, blogs, press and social media are filled with top 10 lists, year in review, articles reflecting back on what has passed and what is to come. I wanted to take a moment to reflect on 2019 and some of the ways the Micro Focus team has come. View Article.

article thumbnail

Health Data Security: Federal, State Trends for 2020

Data Breach Today

While Congress is unlikely to pass major new national cybersecurity legislation in an election year, federal regulators and state attorneys general will be busy addressing evolving health data privacy and security issues in 2020, predicts attorney Marcus Christian of the law firm Mayer Brown.

Security 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

Computer faults that disrupted voting in a North Carolina county in 2016 were not caused by cyber attacks, a federal investigation states. On Monday, the U.S. Department of Homeland Security shared the results of an investigation on computer errors that disrupted voting in a North Carolina county in 2016, authorities were not able to associate them with cyber attacks.

article thumbnail

2020: The Year of Zero Trust?

Data Breach Today

"Zero Trust" security is rapidly transitioning from a marketing buzzword to a practical methodology for protecting today's global networks. Stan Lowe, global CISO of Zscaler, shares his 2020 vision for zero trust.

Marketing 113
article thumbnail

Dark web Grey Market still down, users speculate possible Exit Scam

Security Affairs

Exit scam – Bad news for Grey Market users, one of its administrators revealed that another administrator had emptied the cold storage wallets. According to one of the admins of the Grey Market marketplace one of the admins , ‘ theiving ‘, has stolen all the users’ funds the platform stored for the escrow service. “ you can mark Market as scam exited and ban all our official accounts” reads the message published by the Market admin.

article thumbnail

Cybercrime's Most Lucrative Careers

Dark Reading

Crime pays. Really well. Here's a look at just how much a cybercriminal can earn in a month.

76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Nonprofit organization Special Olympics New York hacked and its server used to send phishing emails

Security Affairs

Special Olympics of New York, a nonprofit organization focused on competitive athletes with intellectual disabilities was hacked. Special Olympics New York provides inclusive opportunities for people with intellectual disabilities to compete in Olympic-style, coached sports. . Unfortunately, the nonprofit organization was hacked during the Christmas holiday and the attackers later used its email server to launch a phishing campaign against its donors. “Friends, Boo!

article thumbnail

Data Discovery Explained

Import.IO

We are now living in the age of big data. In fact, web data is projected to grow even faster due to both machine-based and human-generated data experiencing an overall growth rate of 10 times faster than conventional business data. With such major potential, 89 percent of users believe big. The post Data Discovery Explained appeared first on Import.io.

article thumbnail

Everteam’s InfoGov Strategy Validated by an Increasing Number of Market Entrants

Everteam

In the last several months, a number of commercial and open source Enterprise Content Management vendors have announced new Information Governance offers. As an innovator in Information Governance and the company that helped define the federated, manage in-place paradigm that others are now adopting, Everteam welcomes the competition. New interest in this sector is a strong validation of our approach to meeting Information Governance and Enterprise Content Management challenges.

article thumbnail

What cloud security events will 2020 hold, and what can be done about them?

Information Management Resources

In the new year, we will see the emergence of refined threat actor tactics, techniques and procedures for exfiltrating customer, company and partner data.

Cloud 56
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Turkish Data Protection Board announces extension of VERB?S registration deadline – once again

Data Protection Report

The Turkish Data Protection Board (“Board”) announced the extension of VERB?S registration deadline until June 30, 2020 for: Turkish data controllers with more than 50 employees annually or whose annual total financial statement exceeds TL 25,000,000 (approx. USD 4.2 million), and. Data controllers located abroad. The Board observed that the process was not truly understood by the data controllers.

article thumbnail

Top Posts on IG GURU in 2019

IG Guru

Security, blockchain, legacy media (tape), leadership, frameworks, and misuse of information continue to be popular topics on IG GURU. Below are the top posts from 2019. 14 ways to create a secure password Popular Information Governance Frameworks and Models What is a hacker? CISO: The C-Level executive missing from your board Blockchain Technology is Recordkeeping […].

article thumbnail

Turkish Data Protection Board announces extension of VERB?S registration deadline – once again

Data Protection Report

The Turkish Data Protection Board (“Board”) announced the extension of VERB?S registration deadline until June 30, 2020 for: Turkish data controllers with more than 50 employees annually or whose annual total financial statement exceeds TL 25,000,000 (approx. USD 4.2 million), and. Data controllers located abroad. The Board observed that the process was not truly understood by the data controllers.

article thumbnail

2020 cybersecurity presents an ever-evolving threat landscape

Information Management Resources

The sheer amount of data and its interconnectedness in 2020—along with the determination of cybercriminals to devise with new ways to access it—will add up to trouble, cybersecurity experts warn.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft Shuts Down 50 Domains Used by North Korean Hacking Group

Dark Reading

'Thallium' nation-state threat group used the domains to target mostly US victims.

73
article thumbnail

AI adoption at Walmart today and what’s coming next in 2020

Information Management Resources

Because of our scale, it would be impossible for Walmart to operate without AI because our global supply chain processes orders at speeds that humans cannot match.

IT 42
article thumbnail

Happy New Year! 2020!

IG Guru

IG GURU wishes you a Happy 2020!! Thank you for following us! The post Happy New Year! 2020! appeared first on IG GURU.

53