Thu.Apr 26, 2018

article thumbnail

'Facebook is a morality-free zone’: tech chief lambasted by MP

The Guardian Data Protection

Executive apologises over Cambridge Analytica scandal as Tory MP accuses Facebook of bullying Facebook has been accused of being a “morality-free zone” that bullies journalists and threatens academics, as one of its executives appeared in front of MPs. The Conservative MP Julian Knight told the social network’s chief technical officer, Mike Schroepfer, the company’s reaction to the Cambridge Analytica scandal suggested a “pattern of behaviour” that included “bullying journalists, threatening aca

IT 97
article thumbnail

12 Trends Shaping Identity Management

Dark Reading

As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recent BA Ransomware Incidents Serve Up Lessons

Data Breach Today

Experts Say Breaches Spotlight Vendor Risks Two recent security incidents involving ransomware attacks on vendors serve as the latest reminders of the risks business associates pose to healthcare organizations. What steps should entities take to mitigate those risks?

article thumbnail

Record user policies and procedures manual

TAB OnRecord

Many RIM managers are tasked with finding ways to ensure their RIM programs are effectively and accurately used. The best way to accomplish this is to develop a policies and procedures manual for record users. This will ensure your organization reaps all of its RIM program benefits. It should outline what responsibilities, expectations, and authority [.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Police Seize Webstresser.org, Bust 6 Suspected Admins

Data Breach Today

DDoS Stresser/Booter Service's Servers Seized; Top Users Also Arrested Police have taken down Webstresser, a leading stresser/booter service tied to 4 million on-demand DDoS attacks, which could be used for as little as $15 per month. Six of the site's administrators have been arrested, as have some of the site's top users, authorities say.

133
133

More Trending

article thumbnail

Improving Fraud Prevention: Key Steps

Data Breach Today

Kedar Samant of Simility on Leveraging Machine Learning, Data Analytics Machine learning and data analytics are both critical to fraud prevention, says Kedar Samant, CTO of Simility.

Analytics 100
article thumbnail

Robotic Process Automation: Powering Intelligent Records Management

Gimmal

It's amazing what is being done today with robotic process automation (RPA) tools. Once confined to rote processes that were easy to automate due to the repetitive nature of the work, RPA is now tackling more complex business processes and activities. This evolution allows “knowledge workers” to spend more time focusing on actual knowledge work such as critical thinking and real problem solving – one of the key benefits of implementing an intelligent records management program.

article thumbnail

Improving Key Management

Data Breach Today

Peter Galvin of Thales eSecurity on New Challenges Managing the key management lifecycle for multiple encryption capabilities across platforms and infrastructures is emerging as a challenge for enterprises, says Peter Galvin of Thales eSecurity.

article thumbnail

Preservation and public access to the records of over 240 Kentucky state agencies

Preservica

Real-world digital preservation blog series: The Kentucky Department for Libraries and Archives (KDLA). Beth Shields and Kari May of The Kentucky Department for Libraries and Archives (KDLA) talk about how Preservica’s cloud-hosted digital preservation and access software is enabling their small team to meet state mandates and operate at scale – ingesting, processing and providing citizen access to over 1,000 records a week transferred from more than 240 state agencies.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Promise of Artificial Intelligence in Security

Data Breach Today

OpenText's Gary Weiss on the Role of New Technology Artificial intelligence can help the security community tackle the skills shortage and is also essential to fighting the volume and sophistication of cyberattacks, says Gary Weiss of OpenText.

article thumbnail

Follow Internet security management best practices with ITIL

IT Governance

The Information Technology Infrastructure Library ® ( ITIL ® ) is the most widely adopted IT service management (ITSM) framework in the world, detailing practices that enable you to provide IT services that are better aligned with your organisation’s business needs. All organisations with ITSM needs should adopt ITIL, as it helps them: Be more reliable : ITIL is a proven framework that, when implemented correctly, leads to consistent results; Improve customer satisfaction : ITIL attunes staff to

article thumbnail

Making the Most of Big Data

Data Breach Today

Stu Bradley of SAS on Taking the Right Steps What are the key elements of leveraging big data for analytics? Stu Bradley of SAS provides an overview of the essential steps.

Big data 100
article thumbnail

New Phishing Attack Targets 550M Email Users Worldwide

Dark Reading

In an attempt to steal financial data, the attack bribes users with coupons in exchange for taking an online quiz.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

PyRoMine Uses NSA Exploit for Monero Mining and Backdoors

Threatpost

Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks.

Mining 54
article thumbnail

Why Hackers Love Healthcare

Dark Reading

The migration of valuable data to the cloud is piquing the interest of cybercrimimals. But there are ways to fight back.

Cloud 63
article thumbnail

One community, one vision for digital preservation: The Preservica Global User Group 2018

Preservica

Merton College was this year’s venue for the Preservica Global User Group, hosted in Oxford UK last week. The college, founded in 1246 and home to the oldest continuously functioning library for university academics and students in the world, was a fitting venue for over 100 delegates from 12 countries, who gathered for two days of presentations, workshops and discussion.

article thumbnail

Parting the clouds and seeing the big picture

OpenText Information Management

Many OpenText™ customers, although they have or are deploying Microsoft Office 365, are still struggling with best practices, and are unclear on the differences between Office 365 and OpenText Extended ECM for Microsoft® Office 365®. This was expressed to me when I was at the AIIM conference in sunny San Antonio, Texas, earlier this month, where … The post Parting the clouds and seeing the big picture appeared first on OpenText Blogs.

Cloud 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microfilm Scanning & Conversion: How It’s Done and Why Do It

Record Nations

While much more popular in years past, microfilm was once the most popular choice for storing large amounts of documents and images in a smaller format. Learn how to convert your old microfilm files into a more usable and efficient format with microfilm scanning and conversion. Video Transcription What is Microfilm Microfilming involves creating […].

IT 49
article thumbnail

The Default SAP Configuration That Every Enterprise Needs to Fix

Dark Reading

Nine out of ten organizations are vulnerable to a 13-year-old flaw that puts their most critical business systems at risk of complete criminal takeover.

Risk 53
article thumbnail

Microsoft Issues More Spectre Updates For Intel CPUs

Threatpost

Microsoft has released new Spectre mitigations for Windows 10, which include Intel microcode fixes for CPUs running on Windows.

Cloud 58
article thumbnail

North Korea Ramps Up 'Operation GhostSecret' Cyber Espionage Campaign

Dark Reading

Critical infrastructure, entertainment, finance, healthcare, telecoms, among recent targets of the Lazarus Group, aka Hidden Cobra.

56
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Rubella Crimeware Kit: Cheap, Easy and Gaining Traction

Threatpost

Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial malware payload for social-engineering spam campaigns for just $40 per month.

50
article thumbnail

Europe and Asia Take on More DDoS Attacks

Dark Reading

While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.

47
article thumbnail

Our Disappearing Content: Why Digital Preservation Matters

Preservica

Laurence Hart, director at TeraThink, discusses digital preservation and why it's not just historical archives that need to protect content over the long term (10+ years). "I recently returned from the 2018 AIIM Conference in San Antonio. While there, I visited the Alamo. An old Spanish mission constructed in the 1700s, the Alamo was the scene of several battles including a famous last stand that didn’t end well for the defenders.

article thumbnail

US Healthcare Firms Among Dozens Hit in 'Orangeworm' Cyberattack Campaign

Dark Reading

Attackers target healthcare organizations in apparent data theft mission, but could do far more damage, according to Symantec researchers.

50
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

ABBYY Launches Text Analytics for Contracts

Info Source

Milpitas, CA – April 26, 2018 – ABBYY ® , a global provider of content intelligence solutions and services, today announced the launch of ABBYY Text Analytics for Contracts, a managed service that automatically discovers insights from contracts and leases to speed up risk mitigation, obligation analysis and content migration. With Text Analytics for Contracts, businesses can leverage the entire ABBYY technology portfolio to accelerate time-to-value and successfully implement their contract lifec

article thumbnail

How Microsoft, Amazon, Alphabet Are Reshaping Security

Dark Reading

Tech's biggest giants are shifting the cybersecurity landscape as they incorporate security into their products and services.

article thumbnail

New Tahzoo Website!

JKevinParker

I'm very excited about the new Tahzoo website we just launched. It represents a lot of work form our creative director, our SVP over creative, and me, the SVP over MarTech (as well as a few others). Check it out ! One of my favorite things about this site is how well it works across devices and through sharing on social networks. Here's the view from Twitter: See it for yourself: www.tahzoo.

IT 40