Mon.Jul 30, 2018

article thumbnail

From source to analytics: A farm-to-table approach to data governance

Information Management Resources

Farm-to-table is one way IT experts can frame how they’re governing data and evaluating the tools and technologies necessary for meeting compliance requirements.

article thumbnail

Spanish Government approves new Decree-Law on Data Protection matters

DLA Piper Privacy Matters

Due to the complex balances inside the Spanish Parliament, Spain has been unable to put in place to date (July 2018) a new Data Protection Act that develops the EU Regulation 2016/679 (“GDPR”) in the areas where EU Member States are entitled to fill the gaps or add gold-plating requirements on top of those established by the GDPR. The task is harder than it would in principle appear, because privacy is a constitutional right in Spain and the law changing the scope of any constitutional right (Sp

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

$5 Million in Cryptocurrency Stolen in SIM Hijacking Operation

Dark Reading

College student is arrested for his alleged involvement.

43
article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives. One of more fascinating innovators in this space is 11-year-old DataLocker, based in Overland Park, Kansas. Related: How DataLocker got its start h. Co-founder Jay took a business trip to South Korea in the fall of 2007.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A New SOC Strategy in Light of Skills Shortage

Data Breach Today

A move to a "more autonomous" security operations center is helping Encompass Health cope with a shortage of skilled cybersecurity workers while improving its response to cyber threats, says Mitch Thomas, chief security officer.

More Trending

article thumbnail

On Leaving the Bay Area

John Battelle's Searchblog

I first moved to the Bay area in 1983. I graduated from high school, spent my summer as an exchange student/day laborer in England (long story), then began studies at Berkeley, where I had a Navy scholarship (another long story). 1983. 35 years ago. 1983 was one year before the introduction of the Macintosh (my first job was covering Apple and the Mac).

IT 110
article thumbnail

List of data breaches and cyber attacks in July 2018 – 139,731,894 million records leaked

IT Governance

Another month passes where I’m left thinking ‘I should really create a Healthcare category’. So, from next month – I’ll be doing exactly that. There were some incredibly sensitive breaches this month, the majority of which were caused by human error. I imagine human error will continue to be the main cause of data breaches for decades to come – damn humans.

article thumbnail

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still categorized as non-sensitive.

article thumbnail

South Carolina Becomes the First State to Enact the National Association of Insurance Commissioners (NAIC) Insurance Data Security Model Law

Data Matters

In October 2017, the National Association of Insurance Commissioners (NAIC) adopted an Insurance Data Security Model Law. According to NAIC’s news release announcing this development, the Model Law was meant to build on the organization’s cybersecurity progress and create a “platform that enhances our mission of protecting consumers.” (For more information on the development of the Model Law, see our prior coverage.) .

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Life’s a breach – the harsh cost of a data breach for professional services firms

IT Governance

Data breaches are an unavoidable fact of life for all organisations, including professional services firms. It’s not a matter of ‘if’ a firm might be breached, but ‘when’. The cyber threat to the UK professional services sector is significant and, with the number of reported incidents on the rise, cyber security should be high on the agenda. Data breaches and phishing are among the most significant cyber threats to professional services firms.

article thumbnail

The Poor Cybersecurity of US Space Assets

Schneier on Security

Good policy paper (summary here ) on the threats, current state, and potential policy solutions for the poor security of US space systems.

article thumbnail

KICKICO security breach – hackers stole over $7.7 million worth of KICK tokens

Security Affairs

ICO platforms are becoming a privileged target for hackers, the last victim in order of time is KickICO, a Blockchain crowdfunding website for ICO. On Friday, KickICO disclosed a security breach, according to the platform attackers accessed to its wallets and stole over 70 million KICK tokens (roughly $7.7 million at the time). The incident occurred on July 26, at 09:04 UTC, KickICO CEO Anti Danilevski explained that its staff learned of the security breach from victims who complained to it. 

article thumbnail

Connected Car Apps Open Privacy Hole For Used Car Owners

Threatpost

In a resale scenario, a previous owner could continue to have access to the online account – with all the new owner’s information stored within.

Privacy 54
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Titan Security Keys- Google announced USB-based FIDO U2F Keys

Security Affairs

Google will start offering Titan Security Keys to provide a further layer of security to its users and protect them from Phishing and MiTM attacks. Google announced at Google Cloud Next ’18 convention in San Francisco the launch of the Titan Security Keys, a USB device that is used as part of its hardware-based two-factor authentication scheme for online accounts. “Titan Security Key, available now to Cloud customers, and coming soon to the Google Store” states a blog post pub

article thumbnail

Protect Your Sensitive Information with Secure Destruction

Armstrong Archives

Secure destruction of sensitive personal, financial, and healthcare information is a must. In the day and age of sophisticated hackers and cybercriminals, one can never be too careful when discarding sensitive information. It’s not enough to rip up paper documents anymore – now that data has gone digital, it’s necessary to securely destroy sensitive information in cyberspace as well.

article thumbnail

A new sophisticated version of the AZORult Spyware appeared in the wild

Security Affairs

A new sophisticated version of the AZORult Spyware was spotted in the wild, it was involved in a large email campaign on July 18. Malware researchers at Proofpoint spotted a new version of the AZORult Spyware in the wild, it was involved in a large email campaign on July 18, just 24 hours it appeared in cybercrime forums on the Dark Web. Attackers sent out thousands of messages targeting North America.

article thumbnail

ICRM Partners with LIU Post Palmer School of Library and Information Science

IG Guru

July 23, 2018 The Institute of Certified Records Managers (ICRM) and the LIU Post Palmer School of Library and Information Science, announce a strategic partnership to allow master’s and post-masters graduates of the LIU Post Certificate of Advanced Study in Archives and Records Management, who have completed their coursework (online, in-classroom, or both), and meet […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fileless PowerGhost cryptocurrency miner leverages EternalBlue exploit to spread

Security Affairs

Security experts from Kaspersky Lab have spotted a new cryptocurrency miner dubbed PowerGhost that can spread leveraging a fileless infection technique. The PowerGhost miner targets large corporate networks, infecting both workstations and servers, it employing multiple fileless techniques to evade detection. “The malware, which we dubbed PowerGhost, is capable of stealthily establishing itself in a system and spreading across large corporate networks infecting both workstations and server

article thumbnail

Five myths of digital transformation

Information Management Resources

Since CEOs are now at least asking about digital transformation, and every technology vendor now claims expertise in digital transformation, it’s time to burst a few of the myths surrounding digital transformation.

article thumbnail

CyberSecurity 2.0 Humble Bundle

Adam Shostack

Cybersecurity 2.0 is a new promo from Humble Bundle. Nearly $800 worth of books, including my Threat Modeling, Schneier’s Secrets and Lies, and a whole lot more!

article thumbnail

Jailhouse Tablets Allow Inmates to Steal Thousands of Dollars in Credits

Threatpost

After inmates hacked tablets with security vulnerabilities, a CenturyLink spokesperson told Threatpost the "vulnerability issue has been resolved.".

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MUD: The Solution to Our Messy Enterprise IoT Security Problems?

Dark Reading

The 'Manufacturer Usage Description' proposal from IETF offers a promising route for bolstering security across the industry.

IoT 46
article thumbnail

Updated AZORult Spyware Comes with Sophisticated New Techniques

Threatpost

The researchers saw the new version in action in a large email campaign on July 18, just one day after it debuted in underground forums.

IT 42
article thumbnail

New Spectre Variant Hits the Network

Dark Reading

A new proof of concept is a reminder that complex systems can be vulnerable at the most basic level.

48
article thumbnail

DMARC Compliance Lacking in 28 Percent of.Gov Agencies

Threatpost

Despite a looming deadline, over a quarter of federal agencies are still not using basic email security tools. `.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Has eDiscovery Business Confidence Hit the Summertime Blues?: eDiscovery Trends

eDiscovery Daily

As the late, great Eddie Cochran would say (and sing), “there ain’t no cure for the summertime blues”. The Complex Discovery eDiscovery Business Confidence Survey is into its third year and the results are in for the Summer 2018 eDiscovery Business Confidence Survey! As was the case for the 2016 Winter , Spring , Summer and Fall surveys, the 2017 Winter , Spring , Summer and Fall surveys and the 2018 Winter and Spring surveys, the results for the Summer survey are published on Rob Robinson’s t

GDPR 31
article thumbnail

New Software-Defined Perimeter Glossary sheds light on industry terms

Information Management Resources

The SDP Glossary was intended as a reference document to draw enterprises and service providers that are interested in learning more about the underlying technologies and protocols.

article thumbnail

University of Phoenix Poll: 20% of US Adults Have Considered Infosec Careers

Dark Reading

Many respondents could enter the field by leveraging skills they already have.

42