Fri.Mar 06, 2020

article thumbnail

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. The bad news: Visibility and governance take a huge hit. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance.

Cloud 232
article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.

Cloud 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hot Topics in Cybersecurity Research

Data Breach Today

Wade Baker Talks Vulnerability Triage and Quantifying Risk Quantifying risk is a significant challenge in cybersecurity. Wade Baker of Cyentia Institute discusses recent research projects.

article thumbnail

National Day of Unplugging – how switching off can boost business security

Thales Cloud Protection & Licensing

Disconnecting from your mobile device, laptop or tablet can be as good as a holiday. Simply taking a pause from email and social media in favor of a good book or conversation is known to increase your mood and life satisfaction. But it’s also a chance to step back and re-evaluate our online usage. In my family, we regularly ‘unplug’ and use the opportunity to discuss cyber awareness and topics such as the risks to our family information, how we can improve personal safety, and what are we doing

Security 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cyber Candid: Edna Conway and Wendy Nather Unplugged

Data Breach Today

Two Cyber Vets Double Click on Hot Topics of RSA Conference Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.

Cloud 229

More Trending

article thumbnail

GAO: Federal Data Centers Remain Vulnerable to Cyberthreats

Data Breach Today

OMB Changed Definition of What Qualifies As a Federal Data Center A new report from the GAO finds that while multiple federal agencies have succeeded in closing and consolidating centers across the government, over the last eight years many facilities remain vulnerable to cyberthreats from lack of oversight and reporting.

article thumbnail

Most of Linux distros affected by a critical RCE in PPP Daemon flaw

Security Affairs

A critical remote code execution vulnerability affecting the PPP Daemon exposes most Linux systems to cyber attacks. A 17-year-old critical remote code execution vulnerability affecting the PPP Daemon software exposes most Linux systems to hack. The US-CERT issued a security advisory warning users of the RCE in the PPP daemon (pppd) software that is part of almost all Linux based operating systems.

article thumbnail

The New Insider Risk: When Creativity Goes Bad

Data Breach Today

The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.

Risk 218
article thumbnail

TrickBot targets Italy using fake WHO Coronavirus emails as bait

Security Affairs

Crooks continue to exploit the attention on the Coronavirus (COVID-19) outbreak, TrickBot operators target Italian users. A new spam campaign is targeting users in Italy by exploiting the interest on Coronavirus (COVID-19) in the attempt of delivering the TrickBot information-stealing malware. Crooks are attempting to exploit the fear of users of becoming infected with the Coronavirus , experts at Sophos have uncovered a new spam campaign.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Deception Technology in 2020

Data Breach Today

Attivo's CTO and CMO Share Insight on Industry Trends Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks.

Security 194
article thumbnail

Expert publicly discloses Zoho ManageEngine zero-day on Twitter

Security Affairs

A security researcher has disclosed details and PoC code for a zero-day vulnerability in the Zoho ManageEngine product via Twitter. A security expert has disclosed details about a zero-day vulnerability in a Zoho enterprise product via Twitter, a circumstance that could cause serious problems to customers of the company. The flaw affects Zoho ManageEngine Desktop Central endpoint management solution that helps organizations in managing servers, laptops, desktops, smartphones, and tablets from a

article thumbnail

Assessing the Human Element in Cloud Access

Data Breach Today

Markku Rossi Discusses Shifting to Zero Standing Privileges Cloud security demands robust access management. Markku Rossi of SSH Communications Security discusses zero standing privileges and cloud access.

Cloud 191
article thumbnail

7 Cloud Attack Techniques You Should Worry About

Dark Reading

Security pros detail the common and concerning ways attackers target enterprise cloud environments.

Cloud 123
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

2020 Security Agenda: Who Owns it?

Data Breach Today

ForeScout's Ellen Sundra on Security Priorities and Challenges It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of ForeScout.

IT 179
article thumbnail

Virgin Media disclose data breach, over 900,000 Customers impacted

Security Affairs

Virgin Media discloses a data breach that exposed the personal information of roughly 900,000 of its customers. Virgin Media discloses a data breach that exposed the personal information of approximately 900,000 customers (names, home, and email addresses and phone numbers ). The company reported unauthorized access, on at least one occasion, to a misconfigured and unsecured marketing database.

article thumbnail

An Analyst's Observations of RSA Conference

Data Breach Today

Joseph Krull of Aite Group on Where Vendors Are Missing CISO Needs Joseph Krull, an analyst with Aite Group recommends that vendors at RSA Conference should focus on how they integrate with the life of a CISO, rather than fixing point solutions.

179
179
article thumbnail

Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity

Dark Reading

The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyber threats our nation and its businesses face today.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Steve Katz on the CISO Role in 2020

Data Breach Today

World's First CISO Shares Insight to Guide Next Generation of Leaders Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.

article thumbnail

Catches of the month: Phishing scams for March 2020

IT Governance

Want to learn about the latest phishing scams ? Our ‘catches of the month’ feature investigates the most prominent email attacks across the web, explaining how they occurred and the lessons you should learn. 1. Ordnance Survey hack exposes the details of 1,000 employees. Ordnance Survey has confirmed that the email account of its CFO (chief financial officer) was hacked , exposing 1,000 employees’ personal details, including up to four who had their bank details compromised.

article thumbnail

Making the Healthcare Supply Chain 'Smarter'

Data Breach Today

How can the use of "smart contracts" based on distributed ledger technology help improve the overall security picture for healthcare system supply chains? Mitch Parker, CISO of Indiana University Health explains.

Security 165
article thumbnail

Spread of Coronavirus-Themed Cyberattacks Persists with New Attacks

Threatpost

In cybersecurity circles, the Coronavirus is spurring anxiety over the virtual abuse of the deadly disease by scammers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Human-Centric Cybersecurity Stance

Data Breach Today

Homayun Yaqub of Forcepoint on Why People are the New Perimeter Today's cybersecurity landscape is arguably without a perimeter. Homayun Yaqub of Forcepoint describes a human-centric approach to cybersecurity.

article thumbnail

More on Crypto AG

Schneier on Security

One follow-on to the story of Crypto AG being owned by the CIA: this interview with a Washington Post reporter. The whole thing is worth reading or listening to, but I was struck by these two quotes at the end: in South America, for instance, many of the governments that were using Crypto machines were engaged in assassination campaigns. Thousands of people were being disappeared, killed.

article thumbnail

Let's Encrypt: We Won't Revoke All Certificates Right Now

Data Breach Today

Mass Revocation Will Bring Too Much Concern, Project Says Let's Encrypt is going to take a softer approach to resolving the impacts from a bug in its systems that issues free TLS certificates. It will hold off revoking about 1 million certificates until those certificates either expire or are replaced.

article thumbnail

Next-Gen Ransomware Packs a ‘Human’ Punch, Microsoft Warns

Threatpost

Ryuk, DoppelPaymer, Parinacota and other ransomware groups are getting more sophisticated, Microsoft warns.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

7 RSA Takeaways: 'Human Element' Meets Covid-19 Concerns

Data Breach Today

Supply Chain, Zero Trust and Coronavirus Among Topics Dominating 2020 Conference RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over Covid-19 also dominated.

Security 147
article thumbnail

Randi Gillum: Helping a school system manage their IT assets

IBM Big Data Hub

This story is part of Analytics Heroes , a series of profiles on leaders transforming the future of business analytics.

article thumbnail

Critical Zoho Zero-Day Flaw Disclosed

Threatpost

A Zoho zero day vulnerability and proof of concept (PoC) exploit code was disclosed on Twitter.