Tue.Feb 25, 2020

CISA's Krebs: 2016 US Elections Were Cyber 'Sputnik' Moment

Data Breach Today

Cybersecurity Agency Ranks Election Security and Ransomware as Biggest Threats The 2016 U.S.

Why I Didn’t Join a Software Company

Weissman's World

If I heard it once, I heard it a dozen times since announcing my move to Valora Technologies the other week: “So, you’re going to work for a software company!” To which my response has been, “Kind of, but not really.”

IT 156

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

RSA President Rohit Ghai on 'The Human Element'

Data Breach Today

CISOs Need to Share Their Success Stories While the cybersecurity industry has increasingly focused on the roles artificial intelligence and machine learning can play in thwarting attacks, the humans behind the algorithms remain both points of strength and weakness, says RSA President Rohit Ghai, who keynoted the RSA 2020 conference on Tuesday.

Handling Huge Traffic Spikes with Azure Functions and Cloudflare

Troy Hunt

Back in 2016, I wrote a blog post about the Martin Lewis Money show featuring HIBP and how it drove an unprecedented spike of traffic to the service, ultimately knocking it offline for a brief period of time.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Phishing in Healthcare: Yet Another Major Incident

Data Breach Today

Phishing Continues to Be One of the Primary Breach Vectors in Healthcare' Yet another major phishing-related health data breach has been reported to federal regulators. This one potentially exposed the data of more than 100,000 patients at Bellevue, Washington-based Overlake Medical Center & Clinic

More Trending

Facebook Investigated Suspicious Pro-Sanders Content: Report

Data Breach Today

Investigation Found No Links to Russians, Wall Street Journal Reports Facebook recently investigated suspicious content meant to support U.S. presidential candidate Sen.


Stalkerware Installations Up 60% in 2019

Adam Levin

The number of stalkerware apps detected on smartphones increased in 2019, a full 60% over the previous year according to a new report released by Kaspersky Labs. .

'Raccoon' Infostealer Now Targeting 60 Apps: Report

Data Breach Today

Malware-As-A-Service Offering Is Popular on Underground Forums, Researchers Say The operators behind the "Raccoon" infostealer Trojan have added new capabilities to this malware-as-service offering, which now has the ability to steal data from over 60 applications, according to researchers at the security firm CyberArk.

Wendy Nather on How to Make Security 'Democratization' a Reality

Dark Reading

Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Next Cloud Security Challenge: Containers and Kubernetes

Data Breach Today

Agile Development Calls for New Ways to Secure Cloud Services The increasing use of containers and orchestration tools, such as Kubernetes, are driving demand for new cloud security and application deployment processes, according to research from the according to research from the Cloud Security Alliance presented Monday at the RSA 2020 conference.

Cloud 153

North Korea Is Recycling Mac Malware. That's Not the Worst Part

WIRED Threat Level

Lazarus Group hackers have long plagued the internet—using at least one tool they picked up just by looking around online. Security Security / Cyberattacks and Hacks

Ensure Your Cloud Security Is as Modern as Your Business

Dark Reading

Take a comprehensive approach to better protect your organization. Security hygiene is a must, but also look at your risk posture through a data protection lens

Risk 75

Zyxel addresses Zero-Day vulnerability in NAS devices

Security Affairs

Tech vendor Zyxel addresses a critical vulnerability in several network -attached storage (NAS) devices that is already being exploited in the wild.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Google Adds More Security Features Via Chronicle Division

Dark Reading

Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform

Cloud 75

South Korea suffers from the spread of people infected with Corona 19

Security Affairs

In this situation, ‘ Est security’ found malicious code disguised as a ‘Corona 19 real-time status’ inquiry program and asked the public’s attention.

Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work


The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices.

European Commission has chosen the Signal app to secure its communications

Security Affairs

The popular cross-platform encrypted messaging service Signal has been chosen by the European Commission for its communications. The European Commission has decided to adopt for its staff the popular cross-platform encrypted messaging service Signal for its communications.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

New FIDO2 Devices offer a single token for combined PKI – FIDO use cases, without the need to rip and replace existing infrastructure

Thales eSecurity

The Verizon 2019 Data Breach Investigations Report advises organizations to deploy multifactor authentication throughout all systems and discourage password reuse. MFA awareness is not new to CISOs or IT teams.

Hacking campaign targets sites running popular Duplicator WordPress plugin

Security Affairs

Security experts are warning of a new wave of attacks targeting a zero-day vulnerability in the popular Duplicator WordPress Plugin.

Nintendo Cracks Down After High-Profile Leaks

WIRED Threat Level

With the highly anticipated *Animal Crossing: New Horizons* and E3 on the horizon, Nintendo has become “increasingly aggressive” combating leaks over the last couple of months. Security Security / Security News

Decathlon Spain data leak exposed Spanish employees’ data & more

Security Affairs

Experts discovered a leaking, active database with over 123 million records belonging to Decathlon Spain (and possibly Decathlon UK as well).

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Report: Shadow IoT Emerging as New Enterprise Security Problem

Dark Reading

Much of the traffic egressing enterprise networks are from poorly protected Internet-connected consumer devices, a Zscaler study finds

IoT 62

Google fixes Chrome zero-day flaw exploited in the wild

Security Affairs

Google has released Chrome 80 update that addresses three high-severity vulnerabilities, one of them has been exploited in the wild.

See How Adding Oracle Analytics Can Elevate Your EPM Experience

Perficient Data & Analytics

The Oracle EPM suite provides best-in-class business process applications when it comes to activities such as financial planning, consolidation and period-end close.

Experts discovered a new critical OpenSMTPD RCE flaw exploited in the wild

Security Affairs

Experts discovered a new critical remote code execution vulnerability in the OpenSMTPD that could allow hacking email servers running BSD or Linux.

IT 63

The Data Mapping Process with Sitecore Data Exchange Framework

Perficient Data & Analytics

The Sitecore Data Exchange Framework allows for data to be synchronized between two disparate systems, neither of which need to actually be Sitecore. The modeling for the data mapping is handled in the Sitecore content tree, however, the process can involve any two systems you configure.

IT 60

Cybersecurity Industry: It's Time to Stop the Victim Blame Game

Dark Reading

There are far more ways to be helpful than adding to the noise of what a company probably did wrong

Compliance Hurdles You Can Expect With the CCPA

Perficient Data & Analytics

My last blog introduced the CCPA and discussed how it will impact automotive companies. This blog examines compliance hurdles that will come with the California Consumer Privacy Act. The vast majority of the issues that you will face when working towards CCPA compliance are technical ones.

Gmail Is Catching More Malicious Attachments With Deep Learning

WIRED Threat Level

Gmail users get 300 billion attachments each week. To separate legitimate documents from harmful ones, Google turned to AI—and it’s working. Security Security / Cyberattacks and Hacks

IT 56