Wed.Feb 12, 2020

Unsecured Estee Lauder Database Exposed 440 Million Records

Data Breach Today

Security Researcher Finds Emails and Internal Company IT Logs Were Accessible An unsecured, internet-facing database belonging to cosmetic giant Estee Lauder exposed over 440 million company records, including email addresses and IT logs, a researcher discovered.

Access 233

Companies that Scrape Your Email

Schneier on Security

Motherboard has a long article on apps -- Edison, Slice, and Cleanfox -- that spy on your email by scraping your screen, and then sell that information to others: Some of the companies listed in the J.P. Morgan document sell data sourced from "personal inboxes," the document adds.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Learn From How Others Get Breached: Equifax Edition

Data Breach Today

Takeaway: People, Process and Technology Shortcomings Equal Management Failures Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes.

185
185

Reading the 2019 Internet Crime Complaint Center (IC3) report

Security Affairs

The FBI’s Internal Crime Complaint Center (IC3) released the FBI 2019 Internet Crime Report , a document that outlines cybercrime trends over the past year.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

CIA Secretly Owned Swiss Encryption Firm for Years: Reports

Data Breach Today

More Trending

US Counterintelligence Outlines 5 Key Priorities

Data Breach Today

Protecting Infrastructure, Intellectual Property Among Top Concerns The agency that leads counterintelligence efforts for the U.S. has listed five key priorities for the year ahead that go far beyond protecting government secrets. Here's what's on the list

Paula Curtis: Helping a school system discover business insights and serve students

IBM Big Data Hub

This story is part of Analytics Heroes , a series of profiles on leaders transforming the future of business analytics

States Press for Federal Resources to Fight Cyberthreats

Data Breach Today

Congress Hears Testimony on Battling Ransomware, Other Threats at Local Level State government officials told a Senate committee this week that more federal resources are needed to help states combat security cyberthreats, including ransomware.

5 Common Errors That Allow Attackers to Go Undetected

Dark Reading

Make these mistakes and invaders might linger in your systems for years

90

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

Cloud vs. On-Premises Document Solutions: What Does Your Company Need?

AIIM

In today's digital era of information technology, a company needs to consider several factors to decide how to manage their data and documents online.

Cloud 85

Building on Strength: The Micro Focus Brand of Modernization

Micro Focus

Some studies suggest Digital Transformation (DX) should be well underway if not already complete by 2020. The reality is very different for many. Mike Robinson treks into the jungle of IT change to find the best path forward.

FBI: Business Email Compromise Cost Businesses $1.7B in 2019

Dark Reading

BEC attacks comprised nearly half of cybercrime losses last year, which totaled $3.5 billion overall as Internet-enabled crimes ramped up

83

Crypto AG was spied for US, German intelligence agencies for decades

Security Affairs

Swiss authorities are investigating into allegations the company Crypto AG, a Switzerland-based maker of encryption devices, was a front company for the CIA and German intelligence.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Third-Party Breaches - and the Number of Records Exposed - Increased Sharply in 2019

Dark Reading

Each breach exposed an average of 13 million records, Risk Based Security found

Risk 80

Siemens fixed multiple DoS flaws in several products

Security Affairs

Siemens issued Patch Tuesday updates for February 2020 that fixed serious denial-of-service ( DoS ) flaws in several of its products. Siemens released Patch Tuesday updates for February 2020 that address serious denial-of-service ( DoS ) flaws in several of its products.

Securing Containers and Multi-Cloud Operations

Thales eSecurity

The shift toward cloud-native applications is changing the building blocks of IT. Development and maintenance of infrastructure and applications in-house just isn’t an option anymore in many cases.

Cloud 77

Avast Under Investigation by Czech Privacy Agency

Dark Reading

The software security maker is suspected of selling data about more than 100 million users to companies including Google, Microsoft, and Home Depot

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

For Now, America Just Doesn’t Want to Think That Hard

John Battelle's Searchblog

Andrew Yang has dropped out , which means the presidential campaign just got a lot less fun (you must watch this appreciation from The Recount, embedded above). The race also lost a credible and important voice on issues related to the impact of technology on our society.

FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware

Threatpost

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work. Cloud Security Government Hacks Web Security $3.5

Chaos & Order: The Keys to Quantum-Proof Encryption

Dark Reading

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up

DocuWare Enjoys Banner 2019

Document Imaging Report

2019 was a busy year for DocuWare.

Sales 69

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Microsoft Patch Tuesday updates for February 2020 fix IE 0day flaw

Security Affairs

Microsoft February 2020 Patch Tuesday updates address a total of 99 new vulnerabilities, including an Internet Explorer zero-day exploited in the wild.

Sales 68

What Is the Information Advantage?

OpenText Information Management

The Information Advantage is the competitive superiority that comes from using information to its full potential. It is the outcome when a business successfully transforms the way it manages and leverages information. The Information Advantage Digital transformation is no longer a stretch goal.

Stop Defending Everything

Dark Reading

Instead, try prioritizing with the aid of a thorough asset inventory

66

EMR experts support lab outreach managers to boost services outside the hospital

OpenText Information Management

One of the keys to a successful partnership supporting lab integration, CPOE (Computerized Physician Order Entry) and lab outreach is having a solution provider who truly understands the lab’s operations and challenges.

IT 67

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

Threatpost

The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code execution and missing bounds check that could enable memory corruption.

What is a Blockchain platform?

OpenText Information Management

Blockchain is perhaps one of the most overhyped technologies that has ever appeared. In fact, some experts suggest the technology is dying before it has even matured.

Organizations get more focused on the application of disruptive technologies

Information Management Resources

It is an exciting time for IT. But also an exceptionally unsettled one, as rapid evolution is the norm and change that will shape a business's destiny is coming from all directions. Digital transformation Artificial intelligence Data strategy

IT 65