Thu.Jun 13, 2019

Empower Employees While Preventing Insider Data Breaches

Data Breach Today

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Security Affairs

Encrypted messaging service Telegram was hit by a major DDoS attack apparently originated from China, likely linked to the ongoing political unrest in Hong Kong.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

House Approves Lifting HHS Ban on Unique Patient IDs

Data Breach Today

Amendment - Part of a Funding Bill - Still Has a Long Way to Go The House of Representatives has approved an amendment that would lift a 20-year ban on the Department of Health and Human Services funding the development or adoption of a unique, national patient identifier.

Ransomware paralyzed production for at least a week at ASCO factories

Security Affairs

Malware infections could be devastating for production environments, a ransomware infection halts production operations for days at airplane parts manufacturer ASCO. ASCO , is of the world’s largest manufacturers of aerospace components.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Top Drivers for Privileged Account Management

Data Breach Today

Grant Burst of Wallix Says Operational Technology Driving More PAM Rollouts When it comes to drivers for implementing and maintaining privileged access management programs, Wallix's Grant Burst says that demonstrating compliance and safety remain top priorities.

IoT 163

More Trending

Proactive Mitigation: A Cybersecurity Imperative

Data Breach Today

Akamai's Jay Coley on Blunting Hackers by Blocking Emerging Types of Attacks A top cybersecurity imperative for organizations is to "take proactive mitigation before an event even occurs" by tracking attack trends and mitigating against emerging types of attacks, says Akamai's Jay Coley

Report on the Stalkerware Industry

Schneier on Security

Citizen Lab just published an excellent report on the stalkerware industry. citizenlab gdpr privacy reports surveillance

GDPR 101

WAGO Industrial Switches affected by multiple flaws

Security Affairs

A security expert at SEC Consult discovered that some WAGO industrial managed switches are affected by several serious vulnerabilities. A security researcher at consulting company SEC Consult discovered several vulnerabilities in some models of WAGO industrial switches.

What is data protection by design and default

IT Governance

If your organisation is subject to the GDPR (General Data Protection Regulation) , you’re probably aware of your requirement to “implement appropriate technical and organisational measures” to protect the personal data you hold.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Flaw in Evernote Web Clipper for Chrome extension allows stealing data

Security Affairs

Security experts discovered a vulnerability in the popular Evernote Web Clipper for Chrome can be exploited to steal sensitive data from sites visited by users.

Hack Yourself First - The UK Tour by Scott Helme

Troy Hunt

It's the Hack Yourself First UK Tour! I've been tweeting a bit about this over recent times and had meant to write about it earlier, but I've been a little busy of late. Last year, I asked good friend and fellow security person Scott Helme to help me out running my Hack Yourself First workshops.

Gain Certification Skills and Earn Digital badges at Enterprise World 19

OpenText Information Management

Now more than ever, technical certifications help launch and accelerate careers. In technology roles, advancing your career is about demonstrating the skills you bring to an organization and the value you can add, not simply how long you’ve been in the industry.

9 Top Active Directory Security Tools

eSecurity Planet

Active Directory can't protect against every security risk. Here are 9 Active Directory security tools that can help

Risk 90

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

How to Dominate the Domains of the NEW CIP - D3: Digitalizing Core Business Processes


Welcome back to this continuing series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 3, Digitalizing Core Business Processes.

Paper 87

Google's Push to Close a Major Encrypted Web Loophole

WIRED Threat Level

By building security into top-level domains, Google makes it harder for HTTPS to fall short. Security Security / Security News

7 Truths About BEC Scams

Dark Reading

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories


Evernote Critical Flaw Opened Personal Data of Millions to Attack


Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users. Vulnerabilities Web Security chrome browser critical vulnerability cross site scripting attack evernote Evernote extension Proof of Concept

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

SQL Injection Attacks Represent Two-Third of All Web App Attacks

Dark Reading

When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows


High-Severity Cisco Flaw in IOS XE Enables Device Takeover


A high-severity flaw could give attackers full control of Cisco routers or switches. IoT Vulnerabilities Cisco cisco flaw Cisco IOS XE Software Cross-site request forgery high severity flaw IOS XE patch Router switch

IoT 113

DNS Firewalls Could Prevent Billions in Losses to Cybercrime

Dark Reading

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year


Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk


The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.

Risk 112

DNS Firewalls Could Save Companies Billions

Dark Reading

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year


Telegram CEO Fingers China State Actors for DDoS Attack


Durov took to Twitter to hint that Beijing tried to take Telegram offline to disrupt the Hong Kong protests. Government Web Security China DDoS hong kong protests pavel durov secure messaging state actors telegram twitter

Cyberattack Hits Aircraft Parts Manufacturer

Dark Reading

Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear

The Chief Data Officer: A Key Advocate for Information Governance


The role of Chief Data Officer (CDO) is becoming more prevalent in many organizations as their strategic goals evolve to meet the challenges of the fast-growing, data-centered economy. What Does the CDO Do?

BlueKeep RDP Vulnerability a Ticking Time Bomb

Dark Reading

One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing


Rocket.Build 2019: Raising the bar year after year

Rocket Software

Some of my favorite memories as a kid were family picnics in the summer. From a kid’s perspective, it’s clear why. I had more friends and family to play with than usual, and I could eat as much food as I wanted (an obvious win.)

IT 74

The CISO's Drive to Consolidation

Dark Reading

Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started

Five steps to a successful migration to cloud-based SaaS applications

DXC Technology

A digital transformation can deliver improved flexibility, faster speed-to-market and reduced costs, but only if you go about things in the right way. One path to a successful digital transformation is to move traditional applications to cloud-based software-as-a-service (SaaS) applications, a migration that requires a data-driven approach and using technology in strategic, new ways. Traditionally, […]. Applications Partners application migration oracle SaaS

Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech

Dark Reading

ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos