Tue.Dec 17, 2019

article thumbnail

Data compliance challenges in an as-a-service world

Information Management Resources

Organizations are increasingly coming to rely on software-as-a-service, replacing applications that have previously been hosted on-premises.

article thumbnail

Don't Make Security Training a 'One-and-Done'

Dark Reading

How to move beyond one-off campaigns and build a true security awareness program.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Creating a Records Management Plan: Is a DMS or Cloud Storage Better?

Record Nations

There are two main ways of managing files digitally—DMS systems and cloud storage—and while each provide the same basic advantages of going digital, they also have differences that can make one better than the other depending on factors like how much data you need to manage and what your budget looks like. Learn more in […]. The post Creating a Records Management Plan: Is a DMS or Cloud Storage Better?

article thumbnail

Fraud Prevention: Keeping Up With Attackers

Data Breach Today

Anthony Cardoza of XTN Cognitive Security on Defensive Measures Fraud prevention is a perpetual cat-and-mouse game as fraudsters develop new tools and uncover new ways to monetize their activities, says Anthony Cardoza of XTN Cognitive Security, who offers defensive insights.

Security 200
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

[Podcast] Innovations That Put the “Intelligence” into Intelligent Information Management

AIIM

With the new year just a few weeks away, many have shifted their day-to-day focus to long-term planning and prioritizing their efforts for 2020. For most, it’s likely that the new year will bring with it new technology and innovation. But, with all the developments in technology and changes in process and workflow these days, it can be difficult to translate innovation into real improvements for your organization.

More Trending

article thumbnail

Immigration and Customs Enforcement Scheduled Approved

National Archives Records Express

On December 11, 2019, the Archivist of the United States approved a request for disposition authority from the U.S. Immigration and Customs Enforcement (ICE) for Detainee Records (schedule DAA-0567-2015-0013). This schedule was originally proposed to NARA on October 26, 2015. NARA published notice of the pending schedule in the Federal Register on July 14, 2017.

FOIA 107
article thumbnail

Study: IoT Devices Have Alarmingly Weak RSA Keys

Data Breach Today

Weakness Lies in Devices Without Quality Entropy Sources IoT devices are generating duplicate prime numbers while generating RSA keys, putting them at risk of a factoring attack, according to new research, which shows such an attack could be done at scale and at a low computing cost.

IoT 162
article thumbnail

TP-Link Archer routers allow remote takeover without passwords

Security Affairs

TP-Link has addressed a critical vulnerability impacting some TP-Link Archer routers that could allow attackers to login without passwords. TP-Link addressed a critical zero-day vulnerability ( CVE-2017-7405 ) in its TP-Link Archer routers that could be exploited by attackers to remotely take their control over LAN via a Telnet connection without authentication. “This is a zero-day flaw that was not previously reported and can affect both home and business environments.” explained

article thumbnail

Mozilla: Firefox Add-On Developers Must Use 2FA

Data Breach Today

Enhanced Authentication Could Help Beef Up Security of the Supply Chain To help enhance security, Firefox extension developers will be required to set up their accounts to support two-factor authentication beginning early next year, Mozilla, the open source community that supports the browser, has announced.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

Researchers spotted a new Remote Access Trojan (RAT), dubbed Dacls, that was used by the Lazarus APT group to target both Windows and Linux devices. Experts at Qihoo 360 Netlab revealed that the North-Korea Lazarus APT group used a new Remote Access Trojan (RAT), dubbed Dacls, to target both Windows and Linux devices. The activity of the Lazarus APT group (aka HIDDEN COBRA ) surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks.

CMS 74
article thumbnail

Maze Ransomware Gang Dumps Purported Victim List

Data Breach Today

Cybercrime Gang's 'Naming and Shaming' Ties to Pressure Victims Into Paying The gang behind Maze ransomware has begun publicly identifying its victims and listing data that it exfiltrated from systems before leaving them crypto-locked. The intent is clear: By naming and shaming victims, the Maze gang is trying to compel them to pay.

article thumbnail

New Orleans Hit By Ransomware Attack

Adam Levin

New Orleans has declared a state of emergency following a ransomware attack. The city government has effectively been offline since December 13 when employees were instructed to turn off all computers and disconnect them from WiFi networks following reports of suspicious network activity. . “The city asks residents and vendors for their patience and understanding as our Information Technology team works to restore all operations to normal,” said New Orleans mayor LaToya Cantrell.

article thumbnail

Why Securing Medical Devices Is So Challenging

Data Breach Today

Improving the security of diverse medical devices is a major challenge for a variety of reasons, according to security leaders at two device manufacturers, who spell out the key issues in this interview.

Security 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Manage API Security

Dark Reading

Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other.

article thumbnail

Hackers Could Use Smart Displays to Spy on Meetings

WIRED Threat Level

By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices.

article thumbnail

A WhatsApp bug could have allowed crashing of all group members

Security Affairs

WhatsApp fixed a severe bug that could have allowed a malicious group member to crash the messaging app for all members of the same group. WhatsApp addressed a severe vulnerability that could have allowed a malicious group member to crash the messaging app for all members of the same group. An attacker could trigger the vulnerability by sending a maliciously crafted message to a targeted group, the message caused the app entering a loop that crashed the devices.

article thumbnail

Flying off the shelf?

Micro Focus

Whether driven by the need to switch platforms and update older systems, or as part of a broader, strategic IT initiative, ERP and CRM systems are a significant part of the IT landscape being targeted in many organizations today. However, the approach is not without considerable business risk. I recommend the careful consideration of a. View Article.

Risk 59
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Online Retailer LightInTheBox exposes unsecured DB containing 1.3TB of web server logs

Security Affairs

vpnMentor researchers discovered an unsecured server belonging to the Chinese e-store LightInTheBox.com containing 1.3TB of web server logs. Infosec researchers have uncovered an unsecured Elasticsearch database containing 1.3TB of web server log entries held by Chinese e-commerce website LightInTheBox.com. LightInTheBox is a Chinese online retailer trading on the New York Stock Exchange, most of its customers are in North America and Europe.

Retail 60
article thumbnail

Alexa, Google Home Eavesdropping Hack Not Yet Fixed

Threatpost

Researchers say that Amazon and Google need to focus on weeding out malicious skills from the getgo, rather than after they are already live.

IoT 64
article thumbnail

Why DecisionBrain is taking notice of IBM Watson Studio Premium for Cloud Pak for Data

IBM Big Data Hub

When planning for a day of business, how do you calculate the numerous factors that may affect your bottom-line revenue? For Serco, a company which operates a bike-sharing service throughout London, the answer was in their data.

Cloud 55
article thumbnail

Epilepsy Foundation Bombarded with Seizure-Triggering Twitter Posts

Threatpost

The Epilepsy Foundation has filed a criminal complaint against undisclosed Twitter users who users its Twitter feed to post seizure-inducing content.

IT 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Welcome Chief Product Officer Rekha Shenoy!

Zapproved

Zapproved, the leading ediscovery software provider for managing corporate litigation, today announced that Rekha Shenoy has joined the company as Chief Product Officer. The post Welcome Chief Product Officer Rekha Shenoy! appeared first on Zapproved.

52
article thumbnail

FTC Finalizes Settlement with Company that Misled Consumers about how it Accesses and Uses their Email

Information Governance Perspectives

The Federal Trade Commission finalized a settlement with an email management company that allegedly deceived some consumers about how it accesses and uses their email. The FTC alleged that Unrollme Inc., which helps users unsubscribe from unwanted emails or consolidate their email subscriptions, falsely told consumers that it would not “touch” their personal emails in order Continue reading.

Access 52
article thumbnail

WhatsApp Fixes Yet Another Group Chat Security Gap

WIRED Threat Level

The flaw would have given attackers an avenue for crashing the app—every time a user opened an infected group thread.

article thumbnail

Accessibility Features in the Workplace

Jamf

This JNUC 2019 session focused on how Apple's accessibility features can level the playing field for people with diverse needs.

Access 55
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Iranian Attacks on Industrial Control Systems

Schneier on Security

New details : At the CyberwarCon conference in Arlington, Virginia, on Thursday, Microsoft security researcher Ned Moran plans to present new findings from the company's threat intelligence group that show a shift in the activity of the Iranian hacker group APT33, also known by the names Holmium, Refined Kitten, or Elfin. Microsoft has watched the group carry out so-called password-spraying attacks over the past year that try just a few common passwords across user accounts at tens of thousands

article thumbnail

4 top trends that will impact how organizations use analytics

Information Management Resources

Top analytics trends in 2020 will include the rise of a new analytics stack, a more diagnostic approach to analysis, a demand for more useful facts, and the emergence of a new role - the operational analyst.

article thumbnail

Managing Swift Playgrounds subscriptions with AppConfig and Jamf

Jamf

Learn how to customize Swift Playgrounds by applying settings remotely with Jamf Pro or Jamf School.

52