Wed.Feb 12, 2020

US Counterintelligence Outlines 5 Key Priorities

Data Breach Today

Protecting Infrastructure, Intellectual Property Among Top Concerns The agency that leads counterintelligence efforts for the U.S. has listed five key priorities for the year ahead that go far beyond protecting government secrets. Here's what's on the list

Reading the 2019 Internet Crime Complaint Center (IC3) report

Security Affairs

The FBI’s Internal Crime Complaint Center (IC3) released the FBI 2019 Internet Crime Report , a document that outlines cybercrime trends over the past year.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

States Press for Federal Resources to Fight Cyberthreats

Data Breach Today

Congress Hears Testimony on Battling Ransomware, Other Threats at Local Level State government officials told a Senate committee this week that more federal resources are needed to help states combat security cyberthreats, including ransomware.

Companies that Scrape Your Email

Schneier on Security

Motherboard has a long article on apps -- Edison, Slice, and Cleanfox -- that spy on your email by scraping your screen, and then sell that information to others: Some of the companies listed in the J.P. Morgan document sell data sourced from "personal inboxes," the document adds.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

CIA Secretly Owned Swiss Encryption Firm for Years: Reports

Data Breach Today

German and US Intelligence Reportedly Used Company's Equipment to Spy on 100 Countries Intelligence agencies in the United States and West Germany secretly owned a controlling stake in Swiss firm Crypto AG for decades and used their access to the company's encrypted communications equipment to spy on over 100 countries, including friends and foes alike, according to news reports.

More Trending

Learn From How Others Get Breached: Equifax Edition

Data Breach Today

Takeaway: People, Process and Technology Shortcomings Equal Management Failures Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes.

153
153

Third-Party Breaches - and the Number of Records Exposed - Increased Sharply in 2019

Dark Reading

Each breach exposed an average of 13 million records, Risk Based Security found

Risk 72

Unsecured Estee Lauder Database Exposed 440 Million Records

Data Breach Today

Security Researcher Finds Emails and Internal Company IT Logs Were Accessible An unsecured, internet-facing database belonging to cosmetic giant Estee Lauder exposed over 440 million company records, including email addresses and IT logs, a researcher discovered.

Access 153

Crypto AG was spied for US, German intelligence agencies for decades

Security Affairs

Swiss authorities are investigating into allegations the company Crypto AG, a Switzerland-based maker of encryption devices, was a front company for the CIA and German intelligence.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Securing Containers and Multi-Cloud Operations

Thales eSecurity

The shift toward cloud-native applications is changing the building blocks of IT. Development and maintenance of infrastructure and applications in-house just isn’t an option anymore in many cases.

Cloud 68

For Now, America Just Doesn’t Want to Think That Hard

John Battelle's Searchblog

Andrew Yang has dropped out , which means the presidential campaign just got a lot less fun (you must watch this appreciation from The Recount, embedded above). The race also lost a credible and important voice on issues related to the impact of technology on our society.

Siemens fixed multiple DoS flaws in several products

Security Affairs

Siemens issued Patch Tuesday updates for February 2020 that fixed serious denial-of-service ( DoS ) flaws in several of its products. Siemens released Patch Tuesday updates for February 2020 that address serious denial-of-service ( DoS ) flaws in several of its products.

Lawyers are the real winners in the Yahoo data breach compensation case

IT Governance

Last week, victims of Yahoo’s data breaches between 2012 and 2016 were given good news, with the proposed settlement from the US class-action lawsuit heading to a judge for final approval. Yahoo, now owned by Verizon, has agreed to pay $117.5

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Microsoft Patch Tuesday updates for February 2020 fix IE 0day flaw

Security Affairs

Microsoft February 2020 Patch Tuesday updates address a total of 99 new vulnerabilities, including an Internet Explorer zero-day exploited in the wild.

Sales 62

What Is the Information Advantage?

OpenText Information Management

The Information Advantage is the competitive superiority that comes from using information to its full potential. It is the outcome when a business successfully transforms the way it manages and leverages information. The Information Advantage Digital transformation is no longer a stretch goal.

Cloud vs. On-Premises Document Solutions: What Does Your Company Need?

AIIM

In today's digital era of information technology, a company needs to consider several factors to decide how to manage their data and documents online.

Cloud 56

Webinar: Know your rights! Smart strategies against GDPR fines

DLA Piper Privacy Matters

With the EU General Data Protection Regulation (GDPR) having been applicable for almost two years now, data protection supervisory authorities (DPAs) are entering into full enforcement mode all over Europe, resulting in significantly higher fines compared to the pre-GDPR world.

GDPR 56

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

CSR Releases Graphic for 2019 US Breach Fines

IG Guru

The post CSR Releases Graphic for 2019 US Breach Fines appeared first on IG GURU. Breach Business IG News Information Governance information privacy information security Privacy Risk News Security Sponsored

Risk 56

A Proposition to Drive E-Tail Scanner Sales

Document Imaging Report

I was doing an interview recently with a scanner vendor which was planning on introducing a new SOHO model, for which they expected Amazon to serve as the primary marketplace. Amazon sells a lot of document scanners.

Sales 56

What is a Blockchain platform?

OpenText Information Management

Blockchain is perhaps one of the most overhyped technologies that has ever appeared. In fact, some experts suggest the technology is dying before it has even matured.

Paula Curtis: Helping a school system discover business insights and serve students

IBM Big Data Hub

This story is part of Analytics Heroes , a series of profiles on leaders transforming the future of business analytics

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Top 5 use cases of Blockchain in the supply chain in 2020

OpenText Information Management

Managing today’s supply chains is extraordinarily complex. According to shipping giant, Maersk, one shipment of refrigerated goods from East Africa to Europe can pass through roughly 30 people and organizations, involving more than 200 interactions.

FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware

Threatpost

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work. Cloud Security Government Hacks Web Security $3.5

EMR experts support lab outreach managers to boost services outside the hospital

OpenText Information Management

One of the keys to a successful partnership supporting lab integration, CPOE (Computerized Physician Order Entry) and lab outreach is having a solution provider who truly understands the lab’s operations and challenges.

IT 55

Chaos & Order: The Keys to Quantum-Proof Encryption

Dark Reading

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

Threatpost

The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code execution and missing bounds check that could enable memory corruption.