Mon.May 14, 2018

article thumbnail

NIS Regulations: Government publishes guidance for competent authorities

IT Governance

With the Directive on security of network and information systems (NIS Directive) to be transposed into national laws across the EU by 9 May 2018, the UK government has published guidance for those tasked with its enforcement. The UK government has transposed the NIS Directive into national law, and officially titled it The Network and Information Systems Regulations 2018 (NIS Regulations).

article thumbnail

Chili's Speed Question: To Notify or Not to Notify Quickly?

Data Breach Today

Restaurant Chain Reports Breach But Has Yet to Confirm Details Chili's Grill & Bar is warning customers that an unknown number of payment cards were compromised at an unknown number of corporate-owned locations earlier this year for a period of time it suspects lasted two months. Should Chili's have waited to alert customers until it had more information?

IT 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What banks can do to avoid drowning in data

Information Management Resources

It can be difficult for financial services companies to glean customer insights from the abundance of information they have.

article thumbnail

Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people. The company has blamed the breach on a former employee, who accessed personal data from several of Nuance's clients.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook suspends 200 apps as part of investigation into data misuse

The Guardian Data Protection

After Cambridge Analytica fallout, the company is investigating apps that had access to large amounts of data before 2014 Facebook said it had suspended roughly 200 apps as part of its investigation into the potential misuse of personal data on the social network, the latest fallout from the Cambridge Analytica privacy scandal. In an announcement on Monday, the company also said that it had investigated thousands of apps two months after reporting by the Observer and the Guardian revealed that m

More Trending

article thumbnail

What is incident response management and why do you need it?

IT Governance

No one is immune from cyber attacks, data breaches or other catastrophic disasters. The threat looms over all organisations, so they must always be prepared. How well you respond to a security incident can often mean the difference between a minor disruption and going out of business. . Disruptions can occur in any number of ways and affect different parts of your organisation, so planning for disaster requires a great deal of flexibility.

GDPR 75
article thumbnail

Sizing Up the Impact of Synthetic Identity Fraud

Data Breach Today

Credit card losses due to synthetic identity fraud exceeded $800 million in the U.S. last year, says Julie Conroy of Aite Group, who analyzes the evolving threat and offers mitigation insights.

124
124
article thumbnail

Details on a New PGP Vulnerability

Schneier on Security

A new PGP vulnerability was announced today. Basically, the vulnerability makes use of the fact that modern e-mail programs allow for embedded HTML objects. Essentially, if an attacker can intercept and modify a message in transit, he can insert code that sends the plaintext in a URL to a remote website. Very clever. The EFAIL attacks exploit vulnerabilities in the OpenPGP and S/MIME standards to reveal the plaintext of encrypted emails.

article thumbnail

Three reasons to choose the right Machine Learning algorithm

OpenText Information Management

Here are three reasons why choosing the right algorithm is crucial for the success of any Machine Learning project. A brief introduction to Machine Learning When a programmer needs to create a program that outputs the price of a house based on size, they typically would write an algorithm that, depending on the input (house … The post Three reasons to choose the right Machine Learning algorithm appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Critical PGP Vulnerability

Schneier on Security

EFF is reporting that a critical vulnerability has been discovered in PGP and S/MIME. No details have been published yet, but one of the researchers wrote : We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past.

article thumbnail

7 key things forensic investigators need to do

OpenText Information Management

Law enforcement, government agencies and corporate enterprises alike count on their digital forensic technology to keep evolving alongside their growing needs. In 2017, OpenText™ acquired Guidance Software, makers of EnCase products for forensic investigations, endpoint security, and e-Discovery. Now, we’re excited to announce the release of version 8.07 of EnCase Forensic™ and its more expansive counterpart … The post 7 key things forensic investigators need to do appeared first on OpenTe

article thumbnail

EFail: Encrypted Email Has a Major, Divisive Flaw

WIRED Threat Level

An attack called eFail overcomes the protections of encrypted email standards PGP and S/MIME.

article thumbnail

GDPR Phishing Scam Targets Apple Accounts, Financial Data

Threatpost

A phishing scam fooled victims by claiming to be Apple and scooping up personal details – including financial information and Apple account information.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why Enterprises Can't Ignore Third-Party IoT-Related Risks

Dark Reading

There's a major disconnect between Internet of Things governance and risk management, according to a new report. Follow these five steps to address the risks.

Risk 54
article thumbnail

Italy: Privacy law integrating the GDPR adopted, what to do?

DLA Piper Privacy Matters

The Italian privacy law integrating the GDPR has been finalized by the Board of Ministers, unveiling unexpected surprises a few days before the 25th of May 2018. The Italian Board of Ministers issued the final text of the legislative decree integrating the EU General Data Protection Regulation. Unlike the initial draft of the decree, the new version does not completely repeal the current Italian Privacy Code, but only substantially amends some of its contents, removing sections that are already

GDPR 45
article thumbnail

Facebook Suspends 200 Apps

Dark Reading

Thousands of apps have been investigated as Facebook determines which had access to large amounts of user data before its 2014 policy changes.

Access 54
article thumbnail

Taking digital process automation to the next level: OpenText AppWorks 16.4

OpenText Information Management

Since our inception, OpenText™ has focused on helping organizations get more value out of their information. In today’s world, that mission translates into using information to automate processes that support data-driven decisions; in other words, digital process automation through business applications. With Release 16.4, we’ve made several major improvements that will help our customers achieve … The post Taking digital process automation to the next level: OpenText AppWorks 16.4 appeare

45
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Chili's Suffers Data Breach

Dark Reading

The restaurant believes malware was used to collect payment card data including names and credit or debit numbers.

article thumbnail

Samsung Patches Six Critical Bugs in Flagship Handsets

Threatpost

Samsung updates S9, Note 8 and S8 phones with 27 patches from a RCE bug to a patch that prevents an ancient peek-and-poke attack first identified in 1980s.

article thumbnail

Shadow IoT Devices Pose a Growing Problem for Organizations

Dark Reading

An Infoblox survey shows many companies have thousands of non-business Internet of Things devices connecting to their network daily.

IoT 49
article thumbnail

Chili’s Doesn’t Leave Data Breach on the Back Burner

Threatpost

The fajitas purveyor announced the point-of-sale payment-card breach on Friday May 11, the same day that it learned about it.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Smashing Silos and Building Bridges in the IT-Infosec Divide

Dark Reading

A strong relationship between IT and security leads to strong defense, but it's not always easy getting the two to collaborate.

IT 48
article thumbnail

EFAIL Opens Up Encrypted Email to Prying Eyes

Threatpost

The flaws threaten to expose corporate communications in Outlook as well as the messages of at-risk users like political dissidents.

article thumbnail

'EFAIL' Email Encryption Flaw Research Stirs Debate

Dark Reading

A newly revealed vulnerability in email encryption is a big problem for a small subset of users.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Anti-hacking election group started by ex-U.S., European leaders

Information Management Resources

More than 20 elections in North America and Europe over the next two years will reportedly provide '’fertile ground'’ for interference like that seen during the U.S. presidential election in 2016.

article thumbnail

New ArchivesSpace Integration

Archive-It

by the Archive-It team. We are pleased to announce a new integration that allows partners to link their archived websites to a related ArchivesSpace record. This work was collaboratively completed by Archive-It and New York University (NYU) Libraries as part of Archiving the Websites of Contemporary Composers , a grant funded by The Andrew W. Mellon Foundation.

article thumbnail

Microsoft lobbyist Chavez heads to Google to lead cloud policy

Information Management Resources

The hire comes as big tech companies come under greater scrutiny in Washington for the size of their platforms and over Russian interference in the 2016 presidential election.

Cloud 31