Fri.Mar 20, 2020

article thumbnail

Coronavirus Cybercrime Victims: Please Come Forward

Data Breach Today

Businesses Asked to Report COVID-19-Themed Crime to Police As cybercriminals and nation-states take advantage of the COVID-19 pandemic to further their own aims, authorities are calling on victims to report online attacks as quickly as possible to help them better disrupt such activity.

323
323
article thumbnail

7 Elements in Modern Websites That Your Current Archiving Solution Might Be Missing

Hanzo Learning Center

Remember what websites used to look like back in the day?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to optimize EnCase for a work-from-home workforce

OpenText Information Management

The current global situation has necessitated home-working by many millions of employees, but in the legal and law-enforcement world, there is still a requirement to investigate, respond to eDiscovery requests or maintain a secure environment with rapid incident response capabilities. We introduced flexible deployment options for our OpenText™ EnCase™ solutions a number of years ago, … The post How to optimize EnCase for a work-from-home workforce appeared first on OpenText Blogs.

article thumbnail

Security Breach Disrupts Fintech Firm Finastra

Krebs on Security

Finastra , a company that provides a range of technology solutions to banks worldwide, said it was shutting down key systems in response to a security breach discovered Friday morning. The company’s public statement and notice to customers does not mention the cause of the outage, but their response so far is straight out of the playbook for dealing with ransomware attacks.

Security 279
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

COVID-19 Response: How to Secure a 100% Remote Workforce

Data Breach Today

Cybereason CSO Sam Curry on Business Continuity and Reducing Risk Cybereason CSO Sam Curry is no stranger to crisis - he was on the team that responded to the RSA breach in 2011. But the COVID-19 pandemic brings an unprecedented challenge: How do you manage business continuity and reduce risk with a 100 percent remote workforce? Curry shares strategies and lessons learned.

Risk 242

More Trending

article thumbnail

Analysis: COVID-19 as a Cybercrime Opportunity

Data Breach Today

The latest edition of the ISMG Security Report analyzes how cybercriminals are exploiting the COVID-19 pandemic. Also featured: A discussion of potential 2020 election changes; tips for staying secure in a remote workplace.

Security 238
article thumbnail

IBM SPSS Statistics free trial extended through June 15 due to pandemic

IBM Big Data Hub

We recognize that these are difficult times. In response to the worldwide pandemic, IBM will be extending the SPSS Statistics Subscription trial for active and new accounts through June 15. This will allow our users time to adjust to this dynamic and unprecedented situation.

145
145
article thumbnail

Russian Hackers Relying on Compromised Accounts: Report

Data Breach Today

Group Leveraging Corporate Email Accounts, Trend Micro Researchers Say Russian state-sponsored hackers have switched their techniques, relying more on compromised corporate email accounts to send out targeted phishing emails and spam, according to the security firm Trend Micro.

Phishing 219
article thumbnail

Russia-linked APT28 has been scanning vulnerable email servers in the last year

Security Affairs

Experts warn of scanning activity conducted by Russia-linked APT28 cyberespionage group, hackers are searching for vulnerable mail servers. According to security researchers from Trend Micro, the Russia-linked APT28 cyberespionage group has been scanning vulnerable email servers for more than a year. The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizati

Phishing 133
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

COVID-19 and Financial Markets: 'Unprecedented Times'

Data Breach Today

COVID-19: Modern society has never seen anything like it, and neither have financial markets. Venture capitalist Alberto Yépez analyzes the impact of the disease caused by the new coronavirus on public and private companies' valuations, as well as technology buyers and the threat environment.

Marketing 175
article thumbnail

How to facilitate remote learning: Part 2 — Engaging discussions

Jamf

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part two of our five-part blog series, we show you how to facilitate engaging discussions daily for students and teachers.

Education 117
article thumbnail

UK printing company Doxzoo exposed US and UK military docs

Security Affairs

UK printing company Doxzoo exposed hundreds of gigabytes of information, including documents related to the US and British military. Security experts at vpnMentor discovered 343GB worth of files belonging to the printing company Doxzoo that were exposed on an AWS server. The researchers reported their discovery to the company on January 26, but it never responded.

Military 110
article thumbnail

Covid-19 Spurs Facial Recognition Tracking, Privacy Fears

Threatpost

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn.

Privacy 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Drupal addresses two XSS flaws by updating the CKEditor

Security Affairs

Drupal developers released security updates for versions 8.8.x and 8.7.x that fix two XSS vulnerabilities affecting the CKEditor library. The Drupal development team has released security updates for versions 8.8.x and 8.7.x that address two XSS vulnerabilities that affect the CKEditor library. CKEditor is the far superior successor of FCKeditor, it is a popular, highly configurable open-source WYSIWYG editor.

Libraries 103
article thumbnail

Weekly Update 183

Troy Hunt

Geez, where do I even begin? I honestly wasn't sure, then I could hear the kids playing in the background whilst I was setting up and per the video thought "yeah, stuff it, I'll leave that in" because as messed up as a bunch of stuff is, life goes on. And that's where I really wanted to start this week - what life looks like today. As I say in the video, it's paradoxical because it's all (mostly) very normal here, but it's painful to watch what's happening to friends around the world.

article thumbnail

Pwn2Own 2020 – Participants hacked Adobe Reader, Oracle VirtualBox, and Windows

Security Affairs

Pwn2Own 2020 Day 2 -Participants earned a total of $90,000 for exploits targeting Oracle VirtualBox, Adobe Reader and Windows. The Coronavirus outbreak hasn’t stopped the Pwn2Own hacking conference, for the first time its organizer, the Zero Day Initiative (ZDI), has decided to arrange the event allowing the participants to remotely demonstrate their exploits.

IT 99
article thumbnail

How to empower a remote workforce: Part 2 — Resource access

Jamf

In today’s climate, more organizations than ever before are examining their remote employee and work-from-home policies — be it for health, employee retention or employee productivity reasons. In part two of our three-part blog series, we show you how to securely connect users to resources through zero-trust access.

Access 85
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Working and Executing Contracts From Home: U.S. eSignatures in the COVID-19 Era

Data Matters

Social distancing imperatives and the resulting surge in remote work polices have led to increased demand for the use of electronic signatures in commercial transactions. Although the method of execution is just one factor to consider when determining the validity and enforceability of a contract, electronic signatures — when appropriately deployed — can provide a convenient replacement for manual wet-ink signatures in many transactions.

article thumbnail

CNIL Recalls Data Protection Rules in the Context of the COVID-19 Outbreak

Hunton Privacy

The French Data Protection Authority (the “CNIL”) recently issued guidance for employers relating to the processing of employee and visitor personal data in the context of the COVID-19 outbreak (the “Guidance”). The Guidance outlines some of the principles relating to those data processing activities. The Guidance stresses that employers may not implement measures to fight against the coronavirus pandemic that would infringe on employees’ or visitors’ right to privacy, especially by collecting p

article thumbnail

WhatsApp Is at the Center of Coronavirus Response

WIRED Threat Level

The World Health Organization is partnering with the messaging app to help ensure trustworthy information gets out.

article thumbnail

Dark Reading Cybersecurity Crossword Puzzle

Dark Reading

Here's a little something to snuggle up with if you're on lockdown.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What is Cyber Resilience?

OpenText Information Management

In 2015, former Cisco CEO John Chambers famously wrote: “There are two types of companies: Those that have been hacked, and those that haven’t yet discovered that they’ve been hacked.” Since then, this statement has only become more accurate. In fact, 2019 was the worst year on record for data breaches as the cost of those … The post What is Cyber Resilience?

article thumbnail

200M Records of US Citizens Leaked in Unprotected Database

Dark Reading

Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.

129
129
article thumbnail

AI and the EU – A Proposal for Regulatory Reform

HL Chronicle of Data Protection

In February, the EU Commission announced its strategy for shaping the digital future of the bloc. This included the publication of its long-awaited white paper on the future of artificial intelligence, with proposals for introducing a regulatory framework to govern the adoption and application of AI in both the commercial and public realms. The reforms come in response to growing concerns amongst the public and in the media about the potential harms that may be caused by autonomous machines, and

article thumbnail

How prepared are you for the EU MDR?

OpenText Information Management

On May 26, 2020, the EU Medical Device Regulation (MDR) exits its transition period. There are still questions about how it will operate – and the role of the EUDAMED database – but there is little sign that the EU has any intention of extending the deadline. And even if you gain a short reprieve … The post How prepared are you for the EU MDR?

IT 69
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Defying Covid-19’s Pall: Pwn2Own Goes Virtual

Threatpost

Hacking contest goes virtual with participants remotely winning $295k in prizes for taking down Adobe Reader, Safari and Ubuntu.

75
article thumbnail

Coronavirus/COVID-19: Key Privacy and Security Considerations

Hunton Privacy

The outbreak of COVID-19 has dramatically changed the economy and working landscape of the United States and many other countries across the world. Companies suddenly find themselves dealing with a host of privacy issues and questions about sharing information with employees, customers and others. In addition, transitioning to a remote workforce can create privacy and data security concerns.

Privacy 67
article thumbnail

How to select an Identity and Access Management system in 2020

OpenText Information Management

In a previous blog, I took a look at ‘what are Identity and Access Management solutions?’. As businesses focus on cybersecurity Identity and Access Management (IAM) software is more and more important to enable digital business. The role of IAM extended beyond traditional authentication and authorization to a whole range of new identity services. So, … The post How to select an Identity and Access Management system in 2020 appeared first on OpenText Blogs.

Access 59