Thu.Jan 02, 2020

article thumbnail

How Cybersecurity's Metrics of Misery Fail to Describe Cybercrime Pain

Dark Reading

Dollars lost and data records exposed are valuable measurements, but the true pain of a cybersecurity incident goes far beyond that. We asked infosec pros how they put words to the pain they feel when their defenses fall apart.

article thumbnail

Governance for your data platform: The sooner the better

Information Management Resources

In the same way that better software testing speeds development, imposing data governance early on can speed data platform iteration, while also protecting data and ensuring compliance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Modeling Thursday: Machine Learning

Adam Shostack

For my first blog post of 2020, I want to look at threat modeling machine learning systems. Microsoft recently released a set of documents including “ Threat Modeling AI/ML Systems and Dependencies ” and “ Failure Modes in Machine Learning ” (the later also available in a more printer-friendly version at arxiv.). These build on last December’s “ Securing the Future of Artificial Intelligence and Machine Learning at Microsoft.” First and foremost, I’

article thumbnail

California Adopts Strictest Privacy Law in U.S.

Threatpost

On Wednesday California adopted the strictest privacy law in the United States.

Privacy 64
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Restaurant Chain Landry's Investigates Malware Incident

Data Breach Today

Houston-Based Firm Describes How Card Data May Have Been Breached Landry's Inc., a Houston-based company that owns and operates over 600 restaurants, hotels, casinos and other entertainment establishments in the U.S. and around the world, is investigating an apparent data breach after its security team found malware within a system.

More Trending

article thumbnail

Ambulance Company Slapped With HIPAA Fine

Data Breach Today

Regulator Says Case Involved 'Longstanding Compliance Issues' Federal regulators have smacked a Georgia-based ambulance company with a financial settlement and corrective action plan in a case involving "longstanding" HIPAA compliance issues. How big was the fine, and what factors precipitated it?

article thumbnail

TikTok Banned By U.S. Army Over China Security Concerns

Threatpost

The U.S. Army this week has banned TikTok from government-owned devices as scrutiny over the platform's relationship with China grows.

Security 107
article thumbnail

US Army Follows Navy in Banning TikTok App: Report

Data Breach Today

Lawmakers Have Raised Security Concerns Over Video Sharing App The U.S. Army reportedly is following the lead of the Navy in banning soldiers from using TikTok, a Chinese-made video sharing and social media app, on their government-issued phones.

article thumbnail

Crooks use Star Wars saga as bait in Phishing and malware attacks

Security Affairs

Crooks are exploiting the popularity of the Star Wars saga to monetize their efforts, experts warn of online streaming sites delivering malware. Cybercriminals leverage popular movies like Star Wars to lure users into downloading malware to watch exclusive scenes or the full movie. Experts at Kaspersky have analyzed some threats that exploit the new Star Wars movie The Rise of Skywalker as bait for unaware users. .

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Oregon Requires Vendors to Report Data Breaches

Data Matters

While much of the New Year attention has been focused on California due to the effective date of the California Consumer Privacy Act , a new Oregon law also went into effect on January 1, 2020 complicating compliance with data breach obligations. The law is unique among state data breach notification laws in that it imposes a direct obligation on vendors to provide regulatory notice to the state.

article thumbnail

Shitcoin Wallet Chrome extension steals crypto-wallet private keys and passwords

Security Affairs

Security expert discovered a Google Chrome extension named Shitcoin Wallet that steals passwords and wallet private keys. Harry Denley, director of security at the MyCrypto , discovered that the Google Chrome extension named Shitcoin Wallet is stealing passwords and wallet private keys. The Google Chrome extension was injecting JavaScript code on web pages to steal passwords and private keys from cryptocurrency wallets and cryptocurrency portals.

article thumbnail

6 Security Team Goals for DevSecOps in 2020

Dark Reading

Huge opportunities await security teams that are finally ready move the needle on security problems that have plagued organizations for years.

article thumbnail

Poloniex forces password reset following a data leak

Security Affairs

The Poloniex cryptocurrency exchange is forcing users to reset their passwords following a data leak. . Another bad news for the community of the virtual currencies communities, the Poloniex cryptocurrency exchange has forced its users to reset their passwords following a data leak. . The measure was necessary to prevent spear-phishing attacks against the users aimed at stealing credentials or at delivering malware designed to steal their funds.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Much Do Schools Spend On Paper Per Year

Record Nations

Today, schools are still using enormous amounts of paper everyday. This is because a variety of different reasons, including homework assignments, tests, resource handouts, and more. Papers are often are a valuable resource for students. However, there is an over consumption of paper throughout schools. According to an American survey, a typical teacher uses anywhere […].

Paper 67
article thumbnail

Why well-designed software is crucial in building data management products

Information Management Resources

In the era of big data, every well-functioning product that brings real value to customers must be created by means of efficient and reliable software.

article thumbnail

US restaurant chain Landry’s discloses payment card breach

Security Affairs

The popular US restaurant chain Landry’s announced that it was the victim of a cyber-attack, malware has infected its point of sale (POS) systems. The popular US restaurant chain Landry’s disclosed a security incident, its point of sale (POS) systems have been infected with malware specifically developed to steal customers’ payment card information (i.e. credit card numbers, expiration dates, verification codes and, in some cases, cardholder names).

Sales 50
article thumbnail

Ireland: New DPC Guidance & Launch of Regulatory Strategy Show Greater Emphasis on Privacy by Design & Default

DLA Piper Privacy Matters

By John Magee & Eilís McDonald. As 2019 drew to a close, it was a busy time for the Irish Data Protection Commission (DPC). With the traditional end of year rush, as well as a significant amount of focus in data protection circles on the Advocate General’s opinion in the Schrems II case , privacy professionals could be forgiven for missing out on three new publications issued by the DPC during December alone.

Privacy 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What’s In Your Business Plan? California’s Privacy Law Goes Into Effect

Adam Levin

California’s groundbreaking privacy law went into effect January 1, 2020. The California Consumer Privacy Act (CCPA) requires businesses to inform state residents if their data is being monetized as well as to provide them with a clearly stated means of opting out from the collection of their data and/or having it deleted. Businesses not in compliance with CCPA regulations may be fined by the state of California and sued by its residents.

Privacy 45
article thumbnail

Mechanics of a Crypto Heist: How SIM Swappers Can Steal Cryptocurrency

Dark Reading

The true vulnerability at the heart of SIM-swap attacks on crypto accounts lies in crypto exchanges' and email providers' variable implementation of 2FA.

48
article thumbnail

La ARMA Nostra 2019 Report and Call to Action

IG Guru

A message from Nicholas J. De Laurentis, “The Godfather” of La ARMA Nostra, “This ARMA of Ours” FAMILY HISTORY I wanted to start off by conveying my continued gratitude for the way you have represented our family’s (“This ARMA of Ours”) interest over the last several years. The name, “La ARMA Nostra” was born from a […]. The post La ARMA Nostra 2019 Report and Call to Action appeared first on IG GURU.

article thumbnail

Time for Insider-Threat Programs to Grow Up

Dark Reading

Immature programs attempting to protect against damaging attacks by insiders run the risk of alienating employees.

Risk 73
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Mysterious Drones are Flying over Colorado

Schneier on Security

No one knows who they belong to. (Well, of course someone knows. And my guess is that it's likely that we will know soon.).

IT 65
article thumbnail

CCPA Kickoff: What Businesses Need to Know

Dark Reading

The California Consumer Privacy Act is in full effect, prompting organizations to think about how they'll remain compliant.

Privacy 51
article thumbnail

Data Breach Affects 63 Landry’s Restaurants

Threatpost

Landry's announced that more than 60 of its restaurants may be affected by payment processing system malware.

article thumbnail

Landry's Restaurant Chain Discloses Payment Security Incident

Dark Reading

Some payment cards were mistakenly swiped on order-entry systems that lacked the security of its point-of-sale terminals.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Email breach at Chicago’s Sinai Health System puts data of 12,500 at risk

Information Management Resources

A data security incident at Chicago-based Sinai Health System may have exposed the personal and health information of about 12,000 patients.

Risk 39
article thumbnail

Court Orders Defendants to Produce Laptop for Forensic Examination – Again: eDiscovery Case Law

eDiscovery Daily

In HealthPlan Servs., Inc. v. Dixit, et al., No.: 8:18-cv-2608-T-23AAS (M.D. Fla. Dec. 19, 2019) , Florida Magistrate Judge Amanda Arnold Sansone granted the plaintiff’s motion to order a group of defendants (the “Dixit defendants) to comply with the court’s previous order compelling immediate inspection of a laptop of one of the defendants. Judge Sansone also granted the plaintiff’s motion for fees, sanctions, a jury instruction, and order to show cause why the Dixit defendants should not be h

article thumbnail

What Makes Software User-Friendly?

Docuware

Webopedia.com notes that “Although the term user-friendly represents an important concept, it has been so overused that it has become something of a cliché.”. If you were to play a game of technology buzzword bingo, or create a technology buzzword drinking game, it is likely that “user-friendly” would be on the list. It would be there along with terms like “tangible business value” or “next-generation capabilities.”.

IT 42