Wed.Jun 19, 2019

article thumbnail

How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg.

Security 238
article thumbnail

Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy

Krebs on Security

A medical billing firm responsible for a recent eight-month data breach that exposed the personal information on nearly 20 million Americans has filed for bankruptcy, citing “enormous expenses” from notifying affected consumers and the loss of its four largest customers. The filing, first reported by Bloomberg, comes from the Retrieval-Masters Creditors Bureau , the parent company of the American Medical Collection Agency (AMCA).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AMCA Bankruptcy Filing in Wake of Breach Reveals Impact

Data Breach Today

Court Documents Outline a 'Host of Negative Consequences' The parent company of American Medical Collection Agency has filed for bankruptcy in the wake of a data breach affecting millions of patients. The filing provides an inside look at the "cascade of events" and financial havoc wreaked by a security incident.

article thumbnail

Intelligent Information Management - Learning from CHOCOLATE?!

AIIM

Last week, I had the privilege of teaching our inaugural Foundations of Intelligent Information Management course in Denver, CO. We had students from a variety of industries and locations take part in the course, which is designed to provide participants with a thorough understanding of the fundamentals of information management. Over four days, we covered the entire lifecycle of information management: Creating and capturing information.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Step Away From the Artificial Intelligence

Data Breach Today

ExtraHop's John Matthews Decries AI Buzzwords in the Era of Machine Learning Why does everyone keep mislabeling machine learning - a proven technique for helping organizations to improve their security posture - as artificial intelligence? "I'm so tired of the AI buzzword bingo," says John Matthews, CIO of ExtraHop Networks.

More Trending

article thumbnail

OnDemand Webinar | Asset Management: The Toyota Camry of Cyber Security

Data Breach Today

Security teams' jobs continue to get exceedingly difficult, but they're still spending time trying to figure out where things are and what they are. Security teams' jobs continue to get exceedingly difficult, but they're still spending time trying to figure out where things are and what they are.

Security 160
article thumbnail

How Hackers Emptied Church Coffers with a Simple Phishing Scam

Dark Reading

Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.

article thumbnail

Cloud and Container Adoption: The Visibility Imperative

Data Breach Today

Marco Rottigni of Qualys on Business Best Practices for Digital Transformation As organizations pursue digital transformation initiatives backed by new application deployment techniques, they must ensure that security, operations and development teams fully coordinate, says Marco Rottigni of Qualys.

article thumbnail

Maciej Ceg?owski on Privacy in the Information Age

Schneier on Security

Maciej Ceg?owski has a really good essay explaining how to think about privacy today: For the purposes of this essay, I'll call it "ambient privacy" -- the understanding that there is value in having our everyday interactions with one another remain outside the reach of monitoring, and that the small details of our daily lives should pass by unremembered.

Privacy 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cisco on Cybersecurity: Targeting Optimal Protection

Data Breach Today

Mark Weir Talks Threats, Skills Development and Incident Response Priorities Defending organizations against attackers is more challenging than ever. "The complexity and sophistication of the threats has increased," says Cisco's Mark Weir. "What we're seeing a lot of at the moment as well is intellectual property theft.

article thumbnail

Chart your path in Business Networks: Tackling the integration challenge…

OpenText Information Management

Never before have organizations had to deal with so many data sources as they do today. Data and information are vital to the success of any business but integrating these different and often disparate data islands that lie both inside and outside the four walls of an organization is a constant challenge, and one that … The post Chart your path in Business Networks: Tackling the integration challenge… appeared first on OpenText Blogs.

article thumbnail

Facebook's Libra Cryptocurrency Prompts Privacy Backlash

Data Breach Today

Ecosystem Questions: US, European Officials Demand Answers With Facebook now officially preparing to launch its own cryptocurrency, Libra, in 2020, the social media giant is facing a privacy and security backlash both in the U.S. and Europe. Lawmakers and regulators are raising concerns about the offering based on the company's poor history of protecting user data.

Privacy 155
article thumbnail

Solving the top 5 hybrid records challenges

TAB OnRecord

It’s harder and harder these days to find a records management environment that doesn’t combine both physical and electronic formats. Unfortunately, this "hybrid" records environment poses a number of significant challenges for records managers. In this blog post we offer tips and best practices to help you overcome the top five challenges when managing the hybrid records environment.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Network Security Policy Management: Seeking Visibility

Data Breach Today

AlgoSec's Jeffrey Starr Says IT Environments Ever More Heterogeneous and Complex Visibility, or a lack thereof, continues to challenge organizations as they attempt to protect their businesses by knowing which systems, applications and data they have, says AlgoSec's Jeffrey Starr. He discusses how centralized visibility, control and automation can help.

Security 142
article thumbnail

Tor Browser 8.5.2 fixes Firefox zero-day. Update it now!

Security Affairs

Developers at the Tor Project have released the Tor Browser 8.5.2 to address the recently fixed CVE-2019-11707 zero-day flaw in Mozilla Firefox. Yesterday I reported the news of a critical zero-day in Firefox that was addressed by Mozilla with a new release. The vulnerability, tracked as CVE-2019-11707 , is a type confusion flaw in Array. pop. Mozilla has addressed it with the release of Firefox 67.0.3 and Firefox ESR 60.7.1.

IT 77
article thumbnail

Insecure Home IoT Devices a Clear and Present Danger to Corporate Security

Dark Reading

Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.

IoT 93
article thumbnail

Bouncing Golf cyberespionage campaign targets Android users in Middle East

Security Affairs

According to security researchers at Trend Micro, a cyberespionage campaign is targeting Android users in Middle Eastern countries. Security researchers at Trend Micro have spotted a cyberespionage campaign, dubbed ‘Bouncing Golf, that is targeting Android users in Middle Eastern countries. Threat actors are using a piece of malware detected as GolfSpy, that implements multiple features and can hijack the victim’s device.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cost per Cyberattack Jumps to $4.6M in 2019

Dark Reading

From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.

99
article thumbnail

Feds: Cyberattack on NASA’s JPL Threatened Mission-Control Data

Threatpost

Rampant security-operations bungling allowed cyberattackers to infiltrate JPL's network, which carries human mission data.

article thumbnail

Examples of data processing activities that require a DPIA

IT Governance

The GDPR (General Data Protection Regulation) requires organisations to conduct a DPIA (data protection impact assessment) whenever processing is ‘likely to result in a high risk’ to the rights and freedoms of individuals. The Regulation doesn’t define what ‘high risk’ is, so this blog provides examples of processing activities that require a DPIA. What does ‘high risk’ mean?

GDPR 73
article thumbnail

Serverless Computing from the Inside Out

Dark Reading

The biggest 'serverless' risks don't stem from the technonology itself. They occur when organizations respond to the adoption from the outside in.

Risk 81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Los modelos de aprendizaje automático no siempre pueden manejar la realidad (mientras que la mayoría de los humanos sí)

DXC Technology

Cada vez más directivos de empresa observan la inteligencia artificial (IA) y el aprendizaje automático (ML) como tecnologías de transformación que pueden mejorar la toma de decisiones, aumentar su eficiencia, evitar errores humanos y reducir costes. Sin embargo, para muchos trabajadores, el rendimiento constante e implacable que prometen las máquinas inteligentes aparece como seria amenaza […].

article thumbnail

With GDPR's 'Right of Access,' Who Really Has Access?

Dark Reading

How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.

Access 88
article thumbnail

Mozilla Patches Firefox Critical Flaw Under Active Attack

Threatpost

Mozilla released a new update for Firefox after discovering a critical flaw under active attack.

article thumbnail

OpenText named a leader in latest Forrester Wave: Software for Digital Process Automation for Deep Deployments Q2 2019

OpenText Information Management

Business Process Management (BPM) has come a long way in the last 5 years. Originally designed to tackle the most complex business processes and case management challenges in large organizations – it has become a central element of a successful digital transformation strategy. Today, the technology is better known as Digital Process Automation and the … The post OpenText named a leader in latest Forrester Wave: Software for Digital Process Automation for Deep Deployments Q2 2019 appeared f

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Home Office report reveals susceptibility to accidental data breaches

IT Governance

The Home Office reported 35 data breaches to the ICO (Information Commissioner’s Office) in 2018–19, including several cases of employees accidentally disclosing sensitive information to unauthorised parties. A further 1,895 data breaches were logged by the Home Office’s data controller during the year but deemed not within the data breach notification requirements of the GDPR (General Data Protection Regulation).

article thumbnail

Another Remote Code Execution flaw in WebLogic exploited in the wild

Security Affairs

Oracle released emergency patches for another critical remote code execution vulnerability affecting WebLogic Server. On Tuesday, Oracle released emergency patches for another critical remote code execution vulnerability affecting the WebLogic Server. The vulnerability, tracked as CVE-2019-2729 , affects WebLogic versions 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0.

article thumbnail

10 things to consider when evaluating an MDM

Jamf

In the market for a device management tool? Here are 10 things to look for when selecting a mobile device management (MDM) solution.

MDM 75