Wed.Feb 12, 2020

article thumbnail

Unsecured Estee Lauder Database Exposed 440 Million Records

Data Breach Today

Security Researcher Finds Emails and Internal Company IT Logs Were Accessible An unsecured, internet-facing database belonging to cosmetic giant Estee Lauder exposed over 440 million company records, including email addresses and IT logs, a researcher discovered. What can be done to prevent such mishaps?

Access 306
article thumbnail

Cloud vs. On-Premises Document Solutions: What Does Your Company Need?

AIIM

In today's digital era of information technology, a company needs to consider several factors to decide how to manage their data and documents online. A large share of companies have now adopted cloud-based infrastructure, but many still rely on the tried-and-true legacy of on-premises document management software programs. If you, too, are in a dilemma as to which solution is right for your business, stick around as here is a detailed comparison between cloud and on-premises document solutions.

Cloud 146
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIA Secretly Owned Swiss Encryption Firm for Years: Reports

Data Breach Today

German and US Intelligence Reportedly Used Company's Equipment to Spy on 100 Countries Intelligence agencies in the United States and West Germany secretly owned a controlling stake in Swiss firm Crypto AG for decades and used their access to the company's encrypted communications equipment to spy on over 100 countries, including friends and foes alike, according to news reports.

article thumbnail

Reading the 2019 Internet Crime Complaint Center (IC3) report

Security Affairs

The FBI’s Internal Crime Complaint Center (IC3) released the FBI 2019 Internet Crime Report , a document that outlines cybercrime trends over the past year. Here we are to analyze the annual FBI 2019 Internet Crime Complaint Center (IC3) , one of the most interesting documents on the crime trends observed in the last 12 months. The figure that most of all capture our attention is that victims of cybercrime activities lost $3.5 Billion in 2019.

Phishing 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Learn From How Others Get Breached: Equifax Edition

Data Breach Today

Takeaway: People, Process and Technology Shortcomings Equal Management Failures Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes. The Equifax breach offers a plethora of takeaways to help organizations better repel attackers.

229
229

More Trending

article thumbnail

US Counterintelligence Outlines 5 Key Priorities

Data Breach Today

Protecting Infrastructure, Intellectual Property Among Top Concerns The agency that leads counterintelligence efforts for the U.S. has listed five key priorities for the year ahead that go far beyond protecting government secrets. Here's what's on the list.

article thumbnail

Building on Strength: The Micro Focus Brand of Modernization

Micro Focus

Some studies suggest Digital Transformation (DX) should be well underway if not already complete by 2020. The reality is very different for many. Mike Robinson treks into the jungle of IT change to find the best path forward. Introduction As we turn the corner into a new decade there are plenty who will speculate as. View Article.

article thumbnail

States Press for Federal Resources to Fight Cyberthreats

Data Breach Today

Congress Hears Testimony on Battling Ransomware, Other Threats at Local Level State government officials told a Senate committee this week that more federal resources are needed to help states combat security cyberthreats, including ransomware. They also asked federal officials to share more information on looming security issues.

article thumbnail

Securing Containers and Multi-Cloud Operations

Thales Cloud Protection & Licensing

The shift toward cloud-native applications is changing the building blocks of IT. Development and maintenance of infrastructure and applications in-house just isn’t an option anymore in many cases. Cloud-native application development and the use of containers and orchestration frameworks like Kubernetes offer undeniable advantages in performance, portability and scale.

Cloud 91
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware

Threatpost

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.

Phishing 107
article thumbnail

For Now, America Just Doesn’t Want to Think That Hard

John Battelle's Searchblog

Andrew Yang has dropped out , which means the presidential campaign just got a lot less fun (you must watch this appreciation from The Recount, embedded above). The race also lost a credible and important voice on issues related to the impact of technology on our society. The fact that Yang’s campaign didn’t make it past New Hampshire didn’t surprise the political experts I know, but his rabid base both online and at campaign events clearly did.

article thumbnail

Siemens fixed multiple DoS flaws in several products

Security Affairs

Siemens issued Patch Tuesday updates for February 2020 that fixed serious denial-of-service ( DoS ) flaws in several of its products. Siemens released Patch Tuesday updates for February 2020 that address serious denial-of-service ( DoS ) flaws in several of its products. According to the advisories released by the vendor, a high-severity DoS flaw affects Siemens SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC products. “A Denial-of-Service vulnerability was found in SIMATIC PCS 7, SIMATIC

article thumbnail

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

Threatpost

The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code execution and missing bounds check that could enable memory corruption.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Companies that Scrape Your Email

Schneier on Security

Motherboard has a long article on apps -- Edison, Slice, and Cleanfox -- that spy on your email by scraping your screen, and then sell that information to others: Some of the companies listed in the J.P. Morgan document sell data sourced from "personal inboxes," the document adds. A spokesperson for J.P. Morgan Research, the part of the company that created the document, told Motherboard that the research "is intended for institutional clients.

Marketing 122
article thumbnail

Crypto AG was spied for US, German intelligence agencies for decades

Security Affairs

Swiss authorities are investigating into allegations the company Crypto AG, a Switzerland-based maker of encryption devices, was a front company for the CIA and German intelligence. According to a joint report published by Germany’s ZDF public broadcaster and The Washington Post the Swiss-based firm Crypto AG was operating for CIA and the German Intelligence agency providing them with access to encrypted communications of more than 120 countries for decades.

article thumbnail

Chaos & Order: The Keys to Quantum-Proof Encryption

Dark Reading

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.

article thumbnail

What Is the Information Advantage?

OpenText Information Management

The Information Advantage is the competitive superiority that comes from using information to its full potential. It is the outcome when a business successfully transforms the way it manages and leverages information. The Information Advantage Digital transformation is no longer a stretch goal. Today’s businesses are using information as the fuel to create exceptional customer … The post What Is the Information Advantage?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DocuWare Enjoys Banner 2019

Info Source

2019 was a busy year for DocuWare. The year kicked off with a change at the top, as long-time co-presidents Jürgen Biffar and Thomas Schneck retired and were replaced by their colleagues Dr. Michael Berger and Max Ertl in the roles of overseeing the technical and sales aspects of the business, respectively. Then in March, the Munich-area based ISV named Jim Roberts, a global sales and marketing executive from outside the ECM industry, as the new president of DocuWare Corp., the Americas-based ar

ECM 78
article thumbnail

Paula Curtis: Helping a school system discover business insights and serve students

IBM Big Data Hub

This story is part of Analytics Heroes , a series of profiles on leaders transforming the future of business analytics.

article thumbnail

FBI: Business Email Compromise Cost Businesses $1.7B in 2019

Dark Reading

BEC attacks comprised nearly half of cybercrime losses last year, which totaled $3.5 billion overall as Internet-enabled crimes ramped up.

94
article thumbnail

EMR experts support lab outreach managers to boost services outside the hospital

OpenText Information Management

One of the keys to a successful partnership supporting lab integration, CPOE (Computerized Physician Order Entry) and lab outreach is having a solution provider who truly understands the lab’s operations and challenges. Leslie Tucker, Director of Implementation and Customer Support for OpenText™ EMR-Link™, understands healthcare IT challenges. Her experience as in-house IT staff for physician practices … The post EMR experts support lab outreach managers to boost services outside the hospi

IT 75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Organizations get more focused on the application of disruptive technologies

Information Management Resources

It is an exciting time for IT. But also an exceptionally unsettled one, as rapid evolution is the norm and change that will shape a business's destiny is coming from all directions.

IT 80
article thumbnail

What is a Blockchain platform?

OpenText Information Management

Blockchain is perhaps one of the most overhyped technologies that has ever appeared. In fact, some experts suggest the technology is dying before it has even matured. However, the 2019 Global Blockchain Survey from Deloitte found that over half of respondents saw Blockchain as a critical priority for their business. So, like Mark Twain, Blockchain … The post What is a Blockchain platform?

article thumbnail

A February 2020 Surprise: California Attorney General Proposes Significant Revisions to CCPA Regulations

Data Matters

Just as companies were starting to recover from their exertions to put in place California Consumer Privacy Act (“CCPA”) compliance programs before the law’s January 1, 2020 entry into force, the California Attorney General (“AG”) provided an early February surprise. CCPA watchers long expected that the AG would revise the CCPA regulations he initially proposed on October 10, 2019.

Privacy 68
article thumbnail

Microsoft Patch Tuesday updates for February 2020 fix IE 0day flaw

Security Affairs

Microsoft February 2020 Patch Tuesday updates address a total of 99 new vulnerabilities, including an Internet Explorer zero-day exploited in the wild. Microsoft has released the Patch Tuesday updates for February 2020 that address a total of 99 vulnerabilities, including an Internet Explorer zero-day tracked as CVE-2020-0674 reportedly exploited by the APT group.

Sales 71
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Avast Under Investigation by Czech Privacy Agency

Dark Reading

The software security maker is suspected of selling data about more than 100 million users to companies including Google, Microsoft, and Home Depot.

Privacy 83
article thumbnail

SoundCloud Tackles DoS, Account Takeover Issues

Threatpost

Among other issues, the music platform didn't limit the number of login attempts someone could make.

article thumbnail

Mobile Collection: It’s Not Just for iPhones Anymore

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including his most recent one, DOS and DON’TS of a 30(b)(6) Witness Deposition.