Wed.Oct 26, 2022

article thumbnail

Train Your Team to Ensure You Achieve ISO 27001 Certification

IT Governance

Implementing an ISO 27001-compliant ISMS (information security management system) can seem complex, and it’s often difficult to know how the Standard’s specifications should be applied to your organisation. Failure to understand or comply with the requirements of the Standard could jeopardise your implementation project. This will likely mean you fail the certification audit, potentially costing your organisation dearly.

article thumbnail

Federal Tally Reaches 5,000 Health Data Breaches Since 2009

Data Breach Today

More People Affected by Breaches Than Total US Population The federal tally of health data breaches reached a new milestone this week: Since its inception in September 2009, more than 5,000 major incidents have been posted to the Department of Health and Human Services' HIPAA breach "wall of shame.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Let High-Tech Distract You from Low-Tech

KnowBe4

Deepfakes, the realistic and thoroughly convincing fabrication of imagery, video, and audio that fakes the identity of some person in ways that are difficult to detect, have aroused concern recently. They seem to open the prospect of extraordinarily effective disinformation and social engineering campaigns. Deepfakes have already found their way into advertising campaigns.

105
105
article thumbnail

Cybereason Lays Off Another 200 Workers Amid Report of Sale

Data Breach Today

Cybereason's Latest Layoffs Come Less Than 5 Months After Company Cut Staff by 10% Cybereason has carried out another round of layoffs, axing 200 workers just days after a report that the endpoint security vendor is pursuing a sale. The company plans to reduce its staff by 17% - or 200 employees - less than five months after laying off 10% of its workforce.

Sales 211
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Anticipant Organization

OpenText Information Management

Imagine if the world went dark and there were no internet. Even for a day. For a week. Consider the massive fallout for organizations everywhere. Digitalization has morphed from a useful function to a bedrock of society. It is at the center of all future growth. But as our technology advances beyond human limits, carrying … The post The Anticipant Organization appeared first on OpenText Blogs.

IT 104

More Trending

article thumbnail

OpenSSL to fix the second critical flaw ever

Security Affairs

The OpenSSL Project announced an upcoming update to address a critical vulnerability in the open-source toolkit. The OpenSSL Project announced that it is going to release updates to address a critical vulnerability in the open-source toolkit. Experts pointed out that it is the first critical vulnerability patched in toolkit since September 2016. “The OpenSSL project team would like to announce the forthcoming release of OpenSSL version 3.0.7.

article thumbnail

Zero-Day Hoarding Aids Advanced Spyware, PEGA Committee Told

Data Breach Today

Google's Shane Huntley Urges EU to 'Lead a Diplomatic Effort' to Curb Spyware The problem of zero-day exploits used by advanced spyware makers such as NSO Group is an urgent problem requiring government intervention, a Google cybersecurity executive told the European Parliament committee investigating member nations' use of the Pegasus spy app.

article thumbnail

Why Retail Stores Are More Vulnerable Than Ever to Cybercrime

Dark Reading

When we think about cybercrime and retail it is natural to focus on websites being targeted with attacks. Indeed, there has been a shocking rise in the number of cyberattacks perpetrated against online retailers in the past year. Dakota Murphey explains why store owners and security managers need to also protect their physical locations from the cyber threat, too, however.

Retail 104
article thumbnail

[APPLY TODAY] Security Awareness Training Eligible for $185 million DHS Cybersecurity Grant Opportunity

KnowBe4

The Department of Homeland Security (DHS) is providing $185 million of grant money this year to U.S. states and territories to bolster their cybersecurity defenses, which includes security awareness training. The program will provide $1 billion over the next four years to help states and territories become more resilient to cyber threats.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Two flaws in Cisco AnyConnect Secure Mobility client for Windows actively exploited

Security Affairs

Cisco warns of active exploitation attempts targeting two vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows. Cisco is warning of exploitation attempts targeting two security flaws, tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), in the Cisco AnyConnect Secure Mobility Client for Windows. Both vulnerabilities are dated 2020 and are now patched.

Security 100
article thumbnail

CIPL Publishes White Paper on Protecting Children’s Data Privacy

Hunton Privacy

On October 20, 2022, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published a white paper entitled Protecting Children’s Data Privacy, Policy Paper I, International Issues and Compliance Challenges. The paper identifies and explores the key issues and challenges that organizations and data protection authorities face in the context of globally divergent legal standards and policy approaches relating to children’s data.

Paper 96
article thumbnail

JNUC 2022: Media Q&A recap

Jamf

Following the JNUC Keynote, executives from Google, Okta, AWS, Jamf, SwiftConnect and HID came together with Jamf CEO Dean Hager for an exclusive press Q&A session. During the session, panelists explained how they’re all working together to make today’s work- (and learn-)from-anywhere movement function without a hitch, while striking the perfect balance between security and privacy.

Privacy 91
article thumbnail

Australia Increases Fines for Massive Data Breaches

Schneier on Security

After suffering two large, and embarrassing, data breaches in recent weeks, the Australian government increased the fine for serious data breaches from $2.2 million to a minimum of $50 million. (That’s $50 million AUD, or $32 million USD.). This is a welcome change. The problem is one of incentives, and Australia has now increased the incentive for companies to secure the personal data or their users and customers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

See Tickets discloses data breach, customers’ credit card data exposed

Security Affairs

International ticketing services company See Tickets disclosed a data breach that exposed customers’ payment card details. Ticketing service company See Tickets disclosed a data breach, and threat actors might have accessed customers’ payment card details. Threat actors were able to steal payment card data by implanting a software skimmer on its website.

article thumbnail

Cisco Warns AnyConnect VPNs Under Active Cyberattack

Dark Reading

Older bugs in the AnyConnect Secure Mobility Client are being targeted in the wild, showcasing patch-management failures.

article thumbnail

VMware fixes critical RCE in VMware Cloud Foundation

Security Affairs

VMware addressed a critical remote code execution vulnerability in VMware Cloud Foundation tracked as CVE-2021-39144. VMware has released security updates to address a critical vulnerability, tracked as CVE-2021-39144 (CVSSv3 9.8), in VMware Cloud Foundation. VMware Cloud Foundation is the industry’s most advanced hybrid cloud platform. It provides a complete set of software-defined services for compute, storage, networking, security and cloud management to run enterprise apps—traditional

Cloud 83
article thumbnail

One Step Forward, Two Steps Back: FDA’s Final Guidance on Clinical Decision Software Raises More Questions Than Answers

Data Matters

Recently, the U.S. Food and Drug Administration (FDA) published a suite of guidance documents relating to software, automation, and artificial intelligence. One guidance document in particular, addressing clinical decision support (CDS) software, may signal a tightening in FDA’s oversight on software tools with artificial intelligence and machine learning (AI/ML) that could introduce confusion and frustrate innovation in this important, fast-developing area.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

British hacker arraigned for running The Real Deal dark web marketplace

Security Affairs

A popular British hacker was charged by the U.S. authorities for allegedly running the ‘The Real Deal’ dark web marketplace. The British hacker Daniel Kaye (aka Bestbuy, Spdrman, Popopret, UserL0ser) (34) was charged by the U.S. DoJ for allegedly running the ‘The Real Deal’ dark web marketplace. The man was charged with access device fraud and money laundering conspiracy. “Kaye allegedly operated The Real Deal, a Dark Web market for illicit items, including stolen a

article thumbnail

Apple MacOS Ventura Bug Breaks Third-Party Security Tools

WIRED Threat Level

Your anti-malware software may not work if you upgraded to the new operating system. But Apple says a fix is on the way.

article thumbnail

US charges Ukrainian man with Raccoon Infostealer operation

Security Affairs

US authorities charged a Ukrainian man with computer fraud for allegedly infecting millions of computers with Raccoon Infostealer. The US Justice Department charged a Ukrainian, Mark Sokolovsky (26) man with computer fraud for allegedly infecting millions of computers with the Raccoon Infostealer. The man is currently being held in the Netherlands, he was charged for his alleged role the international cybercrime operation known as Raccoon Infostealer.

Sales 77
article thumbnail

4 Reasons Open Source Matters for Cloud Security

Dark Reading

When we depend on an open commons as our computing foundation, we need it to be secure, and the most effective way to do that is through open solutions.

Cloud 77
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Pro-China Disinfo Campaign Is Targeting US Elections—Badly

WIRED Threat Level

The suspected Chinese influence operation had limited success. But it signals a growing threat from a new disinformation adversary.

IT 80
article thumbnail

The human dimension of cybercrime

OpenText Information Management

It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions. While traditional cybersecurity tactics focused on rules established around the common patterns of usage on the enterprise network, today’s best practices go well beyond that approach. OpenText’s Managed Extended Detection and Response (MxDR) provides active … The post The human dimension of cybercrime appeared first on OpenText Blogs.

article thumbnail

Open Source Is Just the Tip of the Iceberg in Software Supply Chain Security

Dark Reading

As more of the software stack consists of third-party code, it's time for a more-advanced open source vetting system.

article thumbnail

What you should do now in light of the Privacy Reform bill

Data Protection Report

Major privacy law reform in Australia gathered pace this week, with newly tabled legislation proposing to significantly increase penalties for privacy breaches, among other reforms. Now is the time to start asking questions. In preparation for these reforms, companies that collect and process personal information should be asking the following questions: Do we know what data assets we have, and the purpose of collecting and processing the information – a Data Asset Inventory?

Privacy 62
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Dark Reading Launches New Section Dedicated to ICS/OT Security

Dark Reading

ICS/OT Security joins the lineup of 14 cybersecurity topic sections on the media site.

article thumbnail

Passkeys Are Being Pushed in a Big Way

KnowBe4

There is a good chance that you and nearly everyone else will be using passkeys in the near future.

article thumbnail

Worth your time: Watch OpenText World 2022 on-demand

OpenText Information Management

Earlier this month, we brought together the best minds in information management at OpenText World 2022 in Las Vegas. Over three days, attendees explored more efficient, collaborative, and innovative solutions to solve today’s business challenges. The in-person conference may be over, but you can still catch a lot of the great content from OpenText World … The post Worth your time: Watch OpenText World 2022 on-demand appeared first on OpenText Blogs.

Cloud 59