Wed.Sep 15, 2021

article thumbnail

How can organisations close the cyber security skills gap?

IT Governance

A UK government report published last year found that 48% of organisations lacked the expertise to complete routine cyber security practices. This includes an inability to protect against malware, set access controls and apply updates. The report also found that 30% of organisations had skills gaps in more advanced areas, such as penetration testing, forensic analysis and security architecture.

Security 122
article thumbnail

Microsoft Fully Ditches the Password

Data Breach Today

Windows Users Can Now Use Other Methods to Access Microsoft Products Microsoft has officially gone fully passwordless, allowing Windows users to replace their alphanumeric passwords with one of several substitute sign-in technologies to gain entry into a Microsoft product - a move received positively by industry insiders.

Passwords 345
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Customer Care Giant TTEC Hit By Ransomware

Krebs on Security

TTEC , [ NASDAQ: TTEC ], a company used by some of the world’s largest brands to help manage customer support and sales online and over the phone, is dealing with disruptions from a network security incident resulting from a ransomware attack, KrebsOnSecurity has learned. While many companies have been laying off or furloughing workers in response to the Coronavirus pandemic, TTEC has been massively hiring.

article thumbnail

Travis CI Flaw Exposed Secrets From Public Repositories

Data Breach Today

Critics Say Travis CI's Security Bulletin is Insufficient Travis CI, a Berlin-based continuous integration testing vendor, has patched a serious flaw that exposed signing keys, API keys and access credentials and more, potentially putting thousands of organizations at risk. Those using Travis CI should change their secrets immediately.

Risk 330
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A Ransomware Recovery Plan That's Solid Gold

Dark Reading

Having a gold copy of critical data offline is essential in every organization's disaster recovery or continuity plan. Follow the 3-2-1-1 rule to secure your data.

More Trending

article thumbnail

Three formers NSA employees fined for providing hacker-for-hire services to UAE firm

Security Affairs

Three former NSA employees entered into a deferred prosecution agreement that restricts their future activities and employment and requires the payment of a penalty. Three former NSA employees (Marc Baier, 49, Ryan Adams, 34, and Daniel Gericke, 40) entered into a deferred prosecution agreement that restricts their future activities and employment. The trio has worked as hackers-for-hire for the United Arab Emirates cybersecurity company DarkMatter between January 2016 and November 2019.

Access 132
article thumbnail

Navigating the New Internet Attack Surface

Data Breach Today

It’s the largest attack surface in history, and adversaries are taking advantage by launching attacks at an unprecedented volume and velocity. Shashi Prakash of Bolster discusses how to monitor and manage this new and shifting range.

261
261
article thumbnail

Show-me: Spanish Data Protection laws shaken by the Supreme Court

DLA Piper Privacy Matters

By the end of the 2018, the Spanish Parliament belatedly completed the framework provided by EU’s GDPR approving a new Data Protection Act. Following a local tradition dated in 1992, the Spanish legislators deviated themselves from the mainstream position in the EU. The new Spanish law included, among other deviations, new digital rights unknown by the GDPR, a special period of retention of personal data in favor of public authorities after the data had to be deleted or corrected, a genera

GDPR 130
article thumbnail

New York Court Shuts Down Crypto Platform 'Coinseed'

Data Breach Today

State Prosecutors Charged Company With Defrauding Thousands of Investors New York officials won a court order shuttering cryptocurrency trading platform Coinseed, after it allegedly defrauded thousands of investors out of millions of dollars, according to State Attorney General Letitia James. The court also awarded a $3 million judgment against Coinseed and its CEO.

IT 190
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DCMS Consults on National Data Strategy

Hunton Privacy

On September 10, 2021, the UK Government Department for Digital, Culture, Media & Sport (“DCMS”) launched a consultation on its proposed reforms to the UK data protection regime. The consultation reflects DCMS’s effort to deliver on Mission 2 of the National Data Strategy , which is “to secure a pro-growth and trusted data regime in the UK.” Organizations are encouraged to provide input on a range of data protection proposals, some of which are outlined below.

GDPR 109
article thumbnail

Microsoft announces passwordless authentication for consumer accounts

Security Affairs

Microsoft announced that users can access their consumer accounts without providing passwords and using more secure authentication methods. Microsoft will allow its users to log into their consumer accounts without using passwords, they will be able to use Microsoft’s Authenticator app, Windows Hello, physical security keys, or phone/email verification codes. “Which is why I’m so excited about today’s announcement that now you can remove the password from your Microsoft account and sign in

article thumbnail

Identifying Computer-Generated Faces

Schneier on Security

It’s the eyes : The researchers note that in many cases, users can simply zoom in on the eyes of a person they suspect may not be real to spot the pupil irregularities. They also note that it would not be difficult to write software to spot such errors and for social media sites to use it to remove such content. Unfortunately, they also note that now that such irregularities have been identified, the people creating the fake pictures can simply add a feature to ensure the roundness of pupi

Paper 105
article thumbnail

No Patch for High-Severity Bug in Legacy IBM System X Servers

Threatpost

Two of IBM's aging flagship server models, retired in 2020, won’t be patched for a command-injection flaw.

135
135
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

OWASP Reshuffles Its Top 10 List, Adds New Categories

Dark Reading

The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptographic failures at the top and creating three new risk categories.

IT 98
article thumbnail

US SEC announces three actions charging firms for cybersecurity deficiencies

Data Protection Report

On August 30, 2021, the Securities and Exchange Commission (SEC) announced enforcement actions against three sets of broker-dealer and/or investment advisers for alleged failures in the entities’ cybersecurity policies and procedures with respect to email account compromises and the exposure of customer information in violation of Regulation S-P, known as the Safeguards Rule.

article thumbnail

OMIGOD: Azure Users Warned of Critical OMI Vulnerabilities

Dark Reading

Security researchers share the details of four flaws in Open Management Infrastructure, which is deployed on a large number of Linux virtual machines in Azure.

article thumbnail

Attackers Impersonate DoT in Two-Day Phishing Scam

Threatpost

Threat actors dangled the lure of receiving funds from the $1 trillion infrastructure bill and created new domains mimicking the real federal site.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Lets Users Fully Remove Account Passwords

Dark Reading

Users can now delete passwords from their Microsoft account and instead use Windows Hello, Microsoft Authenticator, or physical security keys to log in.

article thumbnail

Seeing the light: Folio Photonics hopes to crack the optical archive disk market via Blocks & Files

IG Guru

Check out the article here. The post Seeing the light: Folio Photonics hopes to crack the optical archive disk market via Blocks & Files appeared first on IG GURU.

article thumbnail

How Your Printer Is Like Swiss Cheese

Dark Reading

Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.

article thumbnail

You Can Now Ditch the Password on Your Microsoft Account

WIRED Threat Level

You no longer need a long string of characters to access Windows and Office 365.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Purchasing Managed Security Services: Strategies for Client References

Dark Reading

There's a scarcity of customers using managed security services who are willing to talk to others about their experiences. Here's how to work with your vendor(s) to leverage their customers' experiences and hard-won wisdom.

article thumbnail

Can Application Security Testing Be Fixed?

ForAllSecure

In August 2021, Brooke S. E. Shoenfield -- Author, Passionate Security Architect, and Curious Questioner of Assumptions -- challenged whether application security can be fixed at FuzzCon 2021. Shoenfield observed and boldly called out that breaches not only continue to roll in, but the cadence continues to increase. It’s no surprise. “We keep applying the same, tired, and often simplistic solutions to this thorny, complex, multi-dimensional problem that we call application security,&

article thumbnail

How Attackers Invest in Cloud-Focused Cybercrime

Dark Reading

A new study reveals an active underground market for access credentials to tens of thousands of cloud accounts and resources.

Cloud 74
article thumbnail

Stretching the boundaries through artificial intelligence: the European proposal for a dedicated regulation. The protection of personal data.

Privacy and Cybersecurity Law

Artificial intelligence feeds on data: both personal and non-personal. It is no coincidence, therefore, that the European Commission’s “ Proposal for a Regulation laying down harmonized rules on Artificial Intelligence ”, published on April 21, 2021 (the Proposal), has several points of contact with the GDPR. The GDPR’s use as a model for the proposal is visible in numerous aspects: Scope of application, which extends beyond Europe’s borders Sanctions system, which proposes the same sanctions as

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ExpressVPN Acquired By Kape Technologies for $936 Million

Dark Reading

Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market

article thumbnail

Archive-It Partner News, September 2021

Archive-It

by the Archive-It team. Seeking Vault Digital Preservation Service Pilot Partners. Interested in preserving data with the Internet Archive’s not-for-profit, self-owned and operated infrastructure? We’re seeking additional partners to join our ongoing pilot to test a new suite of digital preservation services. All data deposited by pilot partners will be preserved and retrievable in perpetuity.

article thumbnail

Don't Try to Outsmart Cybercriminals. Outnumber Them!

Dark Reading

Why hasn't a problem that's lasted for more than 40 years been solved after hundreds of billions of dollars have been spent? Let's take a new approach.

47