Tue.Jan 26, 2021

article thumbnail

Jim Clark: Why He's Giving Away Passwordless Technology

Data Breach Today

Internet Browser Pioneer on ID Threats and Overcoming the Password Liability When he co-founded the firm Beyond Identity in 2020, serial entrepreneur Jim Clark said he felt somewhat responsible for the proliferation of passwords. Now he and partner Tom Jermoluk are doing something about it. They are providing access to their passwordless technology for free.

Passwords 285
article thumbnail

[Podcast] Making Large-Scale Change Happen

AIIM

The workplace in 2021 will demand a different set of skills. Now more than ever, organizations need to embrace disruption as a springboard for competitive advantage and adopt new ways of working that invigorate organizational performance. But making the transition isn't just about the technology involved; success requires the ability to effectively manage change itself.

IT 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2 Arrested for Alleged Theft of COVID-19 Patient Data

Data Breach Today

Netherlands Police Say Data Offered for Sale Online Police in the Netherlands have arrested two health ministry workers for allegedly stealing COVID-19 patient data from the agency's systems and offering it for sale online.

Sales 284
article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Future of Payments Security. madhav. Tue, 01/26/2021 - 09:17. Criminals use a wide range of methods to commit fraud. The increasing trend of using mobile payments for in-store purchases (especially during the pandemic) is leading criminals to increasingly focus their efforts on defrauding people through online fraud and scams. Fraud and scams move to the web.

Security 143
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Vulnerability Researchers Hit by North Korean Hackers

Data Breach Today

Google Warns Social Engineering Attacks Have Been Backdooring Researchers' Systems North Korean hackers have been "targeting security researchers working on vulnerability research and development at different companies and organizations" to trick them into installing backdoored software that gives attackers remote access to their system, warns Google's Threat Analysis Group.

Access 274

More Trending

article thumbnail

Mimecast Confirms SolarWinds Hackers Breached Company

Data Breach Today

Attackers Compromised a Digital Certificate Email security vendor Mimecast confirmed Tuesday that the hackers responsible for the SolarWinds supply chain hack also breached the security firm's network to compromise a digital certificate that encrypts data that moves between some of its products and Microsoft's servers.

article thumbnail

Securing Identities with Zero Trust

Daymark

As COVID forced organizations around the world to send their workforce home, creating the work from home (WFH) phenomenon, IT and security teams rapidly focused on Zero Trust approaches to security to mitigate challenges of enabling secure remote work. Modern workplace employees are getting their work done any way they can these days – using personal devices, sharing data through new services, maxing out home WiFi, and collaborating outside the confines of traditional corporate network security.

Security 115
article thumbnail

Massive Brazilian Data Breach

Schneier on Security

I think this is the largest data breach of all time: 220 million people. ( Lots more stories are in Portuguese.).

article thumbnail

Combating SolarWinds Supply Chain and SUNBURST Backdoor - from Device to Cloud

Data Breach Today

Cloud 208
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Learn SAML: The Language You Don't Know You're Already Speaking

Dark Reading

Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with 'GoldenSAML').

article thumbnail

TikTok privacy issue could have allowed stealing users’ private details

Security Affairs

A vulnerability in the video-sharing social networking service TikTok could have allowed hackers to steal users’ private personal information. Developers at ByteDance, the company that owns TikTok, have fixed a security vulnerability in the popular video-sharing social networking service that could have allowed attackers to steal users’ private personal information.

Privacy 108
article thumbnail

APEC Endorses the First U.S. Non-Profit Accountability Agent

Hunton Privacy

On January 26, 2021, BBB National Programs announced that it has been endorsed as an Accountability Agent for the APEC Cross-Border Privacy Rules (“CBPR”) and Privacy Recognition for Processors (“PRP”) systems. This makes BBB National Programs the seventh CBPR and PRP Accountability Agent worldwide and the first ever U.S. non-profit to be approved by APEC.

Privacy 102
article thumbnail

New Look for State Agency Schedule Amendments

The Texas Record

State agency schedule amendments have a new look! The final-approved PDF copies of state agency schedules have a new streamlined format. These format changes were made to improve the readability and usability of state agency schedules. What’s required of you? Nothing! Procedures for submitting an amendment have not changed. All final publishing of state agency schedules is performed by TSLAC analysts.

IT 95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

'2034: A Novel of the Next World War,' an Exclusive Excerpt

WIRED Threat Level

What if things escalated? What if communications were knocked out? What if cyberwar was just the start? A note about this special six-part series.

article thumbnail

TikTok Flaw Lay Bare Phone Numbers, User IDs For Phishing Attacks

Threatpost

A security flaw in TikTok could have allowed attackers to query query the platform's database – potentially opening up for privacy violations.

Phishing 102
article thumbnail

Grindr fined £8.6m in Norway over sharing personal information

The Guardian Data Protection

Fine from by the Norwegian Data Protection Authority is 10% of Grindr’s global annual revenue Grindr has been fined 100m krone (£8.6m) by the Norwegian Data Protection Authority after an investigation revealed the dating app was sharing deeply personal information with advertisers, including location, sexual orientation and mental health details. The fine is 10% of Grindr’s global annual revenue and is particularly high because of the personal nature of the information shared.

86
article thumbnail

Nefilim Ransomware Gang Hits Jackpot with Ghost Account

Threatpost

An unmonitored account belonging to a deceased employee allowed Nefilim to exfiltrate data and infiltrate systems for a month, without being noticed.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Privacy Teams Helped Navigate the Pivot to Work-from-Home

Dark Reading

Annual Cisco privacy study also reports that 90% of organizations say their customers won't buy from them if they are not clear about data policy practices.

Privacy 128
article thumbnail

Solving the review team conundrum

OpenText Information Management

In litigation and investigations, legal teams must collect, process (make searchable) and review often large volumes of electronically stored information (ESI). Time is of the essence to find the facts that will tell the story: what happened, who was involved, when and where events occurred and other pertinent facts that will help drive settlement or … The post Solving the review team conundrum appeared first on OpenText Blogs.

85
article thumbnail

Mainframe Security Automation Is Not a Luxury

Dark Reading

As cyber threats grow, even the most securable platform is vulnerable and requires adaptive autonomous protection.

Security 108
article thumbnail

23M Gamer Records Exposed in VIPGames Leak

Threatpost

The personal data of 66,000 users was left wide open on a misconfigured Elasticsearch server, joining a growing list of companies with leaky clouds.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Pay-or-Get-Breached Ransomware Schemes Take Off

Dark Reading

In 2020, ransomware attackers moved quickly to adopt so-called "double extortion" schemes, with more than 550 incidents in the fourth quarter alone.

article thumbnail

North Korea Targets—and Dupes—a Slew of Cybersecurity Pros

WIRED Threat Level

The sweeping campaign took advantage of the collaborative spirit among researchers, with an unknown number of victims.

article thumbnail

Startup Offers Free Version of its 'Passwordless' Technology

Dark Reading

Beyond Identity co-founders hope to move the needle in eliminating the need for passwords, but experts say killing passwords altogether won't be easy.

Passwords 127
article thumbnail

North Korea-linked campaign targets security experts via social media

Security Affairs

Google TAG is warning that North Korea-linked hackers targeting security researchers through social media. Google Threat Analysis Group (TAG) is warning that North Korea-linked hackers targeting security researchers through social media. According to the Google team that focuses on nation-state attacks, a North Korea-linked APT group has targeted experts that are working on the research of security vulnerability. “Over the past several months, the Threat Analysis Group has identified an on

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Nvidia Squashes High-Severity Jetson DoS Flaw

Threatpost

If exploited, the most serious of these flaws could lead to a denial-of-service condition for Jetson products.

IoT 102
article thumbnail

UK regulator to write to WhatsApp over Facebook data sharing

The Guardian Data Protection

Information commissioner says the chat app committed in 2017 not to share contact and user information The UK’s data regulator is writing to WhatsApp to demand that the chat app does not hand user data to Facebook, as millions worldwide continue to sign up for alternatives such as Signal and Telegram to avoid forthcoming changes to its terms of service.

GDPR 77
article thumbnail

2034, Part I: Peril in the South China Sea

WIRED Threat Level

“We've got a ship in duress that hasn't sent out a distress signal. Something doesn't add up.”.

Security 103