Wed.May 01, 2019

article thumbnail

Citrix Hackers Camped in Tech Giant's Network for 6 Months

Data Breach Today

FBI Tipoff Led to Discovery; Citrix Blames Poor Password Security Citrix says the data breach it first disclosed in early March appears to have persisted for six months before being discovered and hackers ejected. In an ironic twist, the company sells the very products that might have blocked recent credential stuffing and password spraying attacks against it.

Passwords 243
article thumbnail

Why are Remote Collaboration Tools the Future of Work?

AIIM

Before the introduction of online collaboration tools, work used to take place only in the office. However, online collaboration application has made a huge transformation. Nowadays, work is executed from the place where the team members are present. Online collaboration tools have ended up making the world a smaller place. These applications are smashing all the problems related to location and distance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vodafone, Huawei Dispute Report of Telnet 'Backdoor'

Data Breach Today

Huawei Denies Concealing Backdoors in Equipment Vodafone is disputing a Bloomberg report that security vulnerabilities and backdoors within Huawei networking equipment could have allowed unauthorized access to its fixed-line carrier network in Italy. The report comes as Huawei continues to face concerns over its engineering practices and government ties.

article thumbnail

BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered

The Last Watchdog

Defending a company network is a dynamic, multi-faceted challenge that continues to rise in complexity, year after year after year. Related: Why diversity in training is a good thing. Yet there is a single point of failure common to just about all network break-ins: humans. Social engineering, especially phishing, continues to trigger the vast majority of breach attempts.

Phishing 136
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Managing Third-Party Risks in a New Era

Data Breach Today

How far does an organization's risk surface extend, and who are the custodians of all that data? A new research report aims to answer those questions. In a joint interview, Kelly White, of RiskRecon and Wade Baker of the Cyentia Institute offer an analysis.

Risk 181

More Trending

article thumbnail

Assange Sentenced for Bail Jumping; US Extradition Looms

Data Breach Today

British Judge Sentences WikiLeaks Founder to 50 Weeks in Prison for Violating Bail Conditions On Wednesday, a British judge sentenced WikiLeaks founder Julian Assange to 50 weeks in prison for violating the terms of his bail after he sought political asylum in Ecuador's U.K. embassy in 2012. Now he faces possible extradition to the U.S. to face a charge of "conspiracy to commit computer intrusion.

181
181
article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

Over the last two election cycles, we’ve seen an increased focus on election security, hacking and fraud. While many state and government officials are under no illusion that they are safe from a digital attack, concern should run deeper than election integrity. Most federal security issues are a result of well-known long-standing vulnerabilities that agencies have not addressed.

article thumbnail

Identity Management: Finding Common Ground

Data Breach Today

Access risk: Security leaders understand their governance and technology challenges. But addressing them with new automated tools - and selling these new processes within their organizations? Those are the problems attendees attempted to solve at a recent dinner in Philadelphia.

Risk 178
article thumbnail

Ignore the hysteria, Cloud Foundry is just fine

DXC Technology

Recently, Rishidot analyst Krishnan Subramanian proclaimed the Cloud Foundry, Platform-as-a-Service (PaaS) cloud, had met its demise as a standalone platform. Really? That’s news to me, and I cover Cloud Foundry like paint. What got Subramanian so frazzled was Cloud Foundry started offering Docker in place of its own container runtime, Garden.

Cloud 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What's in HHS' New Plan for Nationwide Health Data Exchange?

Data Breach Today

What are the key privacy and security requirements proposed in the latest draft of the Trusted Exchange Framework and Common Agreement issued by federal regulators to promote nationwide secure health data exchange? Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains.

Privacy 170
article thumbnail

Rethinking how things get done, part 4: Moving to an agile operating model

CGI

Rethinking how things get done, part 4: Moving to an agile operating model. pooja.cs@cgi.com. Wed, 05/01/2019 - 22:28. Imagine you’ve just awakened from a deep sleep, and your enterprise is operating just as you’ve always dreamed. It’s listening to customers, innovating, and designing and launching new products and services quickly. It’s also collaborating more (both internally and externally and with thought leaders) and responding agilely to changing business demands.

article thumbnail

Free download: A Beginner’s Guide to the DPO

IT Governance

Do you need a data protection officer? Since the GDPR (General Data Protection Regulation) came into effect in May 2018, many organisations are asking whether they’re supposed to have a DPO (data protection officer), but sometimes the answer isn’t that simple. Organisations such as public authorities are required to have a DPO under the Regulation, but for others the position isn’t so certain or easily understood.

GDPR 90
article thumbnail

On Security Tokens

Schneier on Security

Mark Risher of Google extols the virtues of security keys: I'll say it again for the people in the back: with Security Keys, instead of the *user* needing to verify the site, the *site* has to prove itself to the key. Good security these days is about human factors; we have to take the onus off of the user as much as we can. Furthermore, this "proof" from the site to the key is only permitted over close physical proximity (like USB, NFC, or Bluetooth).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Dark Reading

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint.

Access 97
article thumbnail

Citrix confirmed hackers had access to its network for five months

Security Affairs

Citrix confirmed that the hackers who breached its network stole sensitive personal information of both former and current employees for about six months. In March, the American multinational software company Citrix disclosed a security breach, according to the firm an international cyber criminals gang gained access to its internal network. Experts at cybersecurity firm Resecurity attributed the attack to Iranian threat actors.

Access 83
article thumbnail

How to: Setting Up Exceptions for Information Policies in everteam.policy

Everteam

Defining and setting up information policies , including retention rules is straightforward. You identify the information class and then assign rules, such as a retention rule. Simple enough. Except when you have multiple jurisdictions that have different rules. Then you’ve got some work to do. Luckily, everteam.policy has you covered. Let’s have a look at how to set up exceptions for information policies.

article thumbnail

Victims of ZQ Ransomware can decrypt their files for free

Security Affairs

Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool. Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool that allows them to decrypt files for free. ZQ Ransomware infected users in the US, India, Polland, Brazil and the UK. The ZQ Ransomware encrypts victim’s files using the Salsa20 and RSA-1024 algorithms.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cartoon Network Hacked Worldwide to Show Brazilian Stripper Videos

Threatpost

Ricardo Milos joined Ben 10, Adventure Time and We Bare Bear videos on its websites over the weekend.

IT 100
article thumbnail

Julian Assange sentenced to 50 weeks in jail

Security Affairs

Julian Assange has been sentenced to 11 months in prison for breaching his bail conditions in 2012 and finding asylum into Ecuadorian embassy for more than seven years. WikiLeaks founder Julian Assange has been sentenced to 50 weeks in prison for breaching his bail conditions in 2012 and finding asylum into Ecuador’s London embassy for more than seven years.

article thumbnail

Small businesses spent £13.6 billion recovering from cyber crime in 2018

IT Governance

One in three UK companies fell victim to cyber attacks in 2018, with the majority of the damage occurring in small businesses, according to a report by Beaming. The study found that cyber crime cost UK organisations £17.8 billion last year, of which £13.6 billion came from small businesses. The average cost of a cyber attack for small businesses was £65,000 per victim.

Cloud 74
article thumbnail

MIVD Dutch intelligence warns of Russian, Chinese cyber espionage

Security Affairs

The Military Intelligence and Security Service (MIVD) warn of “worrying” cyber espionage activities carried out by Russia and China. The Military Intelligence and Security Service (MIVD) warn of “worrying” cyber espionage activities carried out by Russia and China. The warning is included in the annual report published by the Dutch intelligence that cited as an example to attack against the world chemical weapons watchdog.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tapping into medical knowledge through an ambient user interface

DXC Technology

by Jonas Knudsen Medical knowledge has been expanding exponentially. The doubling time — or the pace at which knowledge expands — was estimated at 7 years in 1980, 3.5 years in 2010, and a projected 73 days by 2020, according to a 2011 study in Transactions of the American Clinical and Climatological Association. The dilemma for […].

article thumbnail

Huge DDoS Attacks Shift Tactics in 2019

Dark Reading

Analysis of two high-volume DDoS attacks show they're becoming more difficult to remediate with changes to port and address strategies.

82
article thumbnail

What to look for in a mobile storage solution

TAB OnRecord

Mobile shelving comes in many different styles with plenty of options to choose from. This is great for records managers because it allows them to create the solution that is specifically tailored to their requirements, room configurations and budgets. However, if you are new to mobile shelving, the range of choices can make it difficult to know where to start.

article thumbnail

Industry Guide to Financial Services: What’s driving digital transformation across financial services institutions?

OpenText Information Management

To compete and succeed in today’s fast-changing business climate, banks, insurance companies and other financial services institutions (FSIs) need to have three priorities to contend with new technologies, new market entrants and new ways of working that are changing expectations for the industry. They need to deliver great experiences for customers and They need to … The post Industry Guide to Financial Services: What’s driving digital transformation across financial services institutions

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Owens-Illinois plans for the future after a successful migration to IBM Db2

IBM Big Data Hub

Owens-Illinois (O-I), the world’s largest manufacturer of glass containers, recently undertook a global migration from Oracle to Db2. Learn more about the migration and its success from O-I executives.

article thumbnail

Digital Transformation Exposes Operational Technology & Critical Infrastructure

Dark Reading

The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense.

article thumbnail

DHS BOD 19-02 directive – Critical flaws must be fixed within 15 Days

Security Affairs

The US DHS issued a new Binding Operational Directive ( BOD 19-02 ) instructing federal agencies and departments to patch critical flaws in within 15 days. The U.S. Department of Homeland Security (DHS) issued a new Binding Operational Directive ( BOD 19-02 ) ordering federal agencies and departments quickly patch serious vulnerabilities in Internet-facing systems.