Thu.Aug 30, 2018

article thumbnail

Consumer privacy reaches the U.S. with the California Consumer Privacy Act

Thales Cloud Protection & Licensing

“As California goes, so goes the nation.” This time, California is the first to take a page from the European Union. On the heels of the sweeping Global Data Protection Regulation (GDPR) that took effect on May 25, 2018, the state of California moved quickly, passing its version of a consumer privacy law a month later, on June 28th. The California Consumer Privacy Act (CCPA) is now in the “public consultation” period, the new law will take effect on January 1, 2020.

Privacy 54
article thumbnail

Air Canada: Attack Exposed 20,000 Mobile App Users' Data

Data Breach Today

Airline Hits Password-Nuke Button, Forces Reset on 1.7 Million Accounts Air Canada is forcing 1.7 million mobile app account users to reset their passwords after it detected unusual login behavior that it says may have exposed 20,000 accounts, including passport information. But the company is enforcing password complexity rules that experts advise against.

Passwords 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six steps to improve your file classification- Part 2

TAB OnRecord

In this two-part post we share six steps you can take to improve your current file classification process. In part one we shared insights about where to begin your classification project, and strategies for effectively subdividing your files. In part two we discuss the importance of retention schedules and useful coding tools for your files. [.] Read More.

article thumbnail

Police Probe Sale of 130 Million Chinese Hotel-Goers' Data

Data Breach Today

Hotel Giant Huazhu May Have Accidentally Uploaded Access Credentials to GitHub Police in Shanghai are investigating the apparent loss of 130 million customers' personal details from Huazhu Hotels Group. The data exposure may trace to the Chinese hotel group's developers accidentally accessing credentials for a production database to GitHub.

Sales 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ISO 27001 Global Report 2018: top 3 key takeaways

IT Governance

1) ISO 27001 aids GDPR compliance. ISO 27001 provides an excellent starting point for meeting the technical and operational requirements of the EU GDPR (General Data Protection Regulation). So, it’s no surprise that nearly half (48%) of respondents cited GDPR compliance as their key motivation for adopting the Standard. Implementing a documented, ISO 27001-aligned ISMS (information security management system) can help your organisation achieve GDPR compliance, while providing unquestionable evid

GDPR 67

More Trending

article thumbnail

Can SharePoint and SAP Work Hand-in-Hand?

Gimmal

The below blog post comes from a white paper produced by ASUG and Gimmal: Cruising Along the Information Highway: Understanding your SAP EIM Environment. It discusses the results of a recent survey of the ASUG community surrounding information management best practice awareness. The data is crystal clear: Almost everyone uses SharePoint. The near-optimal penetration of Microsoft Office 365 as a productivity suite means SharePoint is often the first line of defense when it comes to storing and re

Paper 61
article thumbnail

Air Canada data breach – 20,000 users of its mobile app affected

Security Affairs

Air Canada data breach – The incident was confirmed by the company and may have affected 20,000 customers (1%) of its 1.7 million mobile app users. The data breach of the day is the one suffered by Air Canada that may have affected 20,000 customers (1%) of its 1.7 million mobile app users. The news was confirmed by Air Canada that revealed to have detected unusual login behaviour with Air Canada’s mobile App between Aug. 22-24, 2018, it added that financial data was protected but invite

article thumbnail

Plaintiffs File Class Action Lawsuit Against Nielsen over Alleged False and Misleading Statements

Hunton Privacy

On August 28, 2018, plaintiffs filed a class action lawsuit against Nielsen Holdings PLC (“Nielsen”) and some of its officers and directors for making allegedly materially false and misleading statements to investors about the impact of privacy regulations and third-party business partners’ privacy policies on the company’s revenues and earnings.

GDPR 53
article thumbnail

What Happens to Whistleblowers After They Blow the Whistle?

Security Affairs

Whistleblowers are a controversial subgroup of the modern workforce. What Happens to Whistle Site after they reveal uncomfortable truths? Whistleblowers are a controversial subgroup of the modern workforce. Although their intentions are often pure and they frequently uncover wrongdoings or shortcomings in their particular niche, there are usually some consequences too.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cheating in Bird Racing

Schneier on Security

I've previously written about people cheating in marathon racing by driving -- or otherwise getting near the end of the race by faster means than running. In China, two people were convicted of cheating in a pigeon race: The essence of the plan involved training the pigeons to believe they had two homes. The birds had been secretly raised not just in Shanghai but also in Shangqiu.

50
article thumbnail

Learn the fundamentals of iOS management

Jamf

To help those new to iPad and iPhone management — or those looking for a refresher on the basics — we've put together a guide to explain the ABCs of iOS deployment, security and inventory.

article thumbnail

5 Benefits of Switching to Digital Document Storage

Armstrong Archives

You might feel safer with hard copies of your most important files in your hands rather than trusting technology, but is that really the best way to manage your archives? Tech experts say no. Going digital with your documents doesn’t only make sense from an organizational perspective – it’s also the number one way to ensure the long-term safety and security of your most important personal and business records.

Paper 45
article thumbnail

California AG Voices Concern About State’s New Privacy Law

Hunton Privacy

On August 22, 2018, California Attorney General Xavier Becerra raised significant concerns regarding the recently enacted California Consumer Privacy Act of 2018 (“CCPA”) in a letter addressed to the CCPA’s sponsors, Assemblyman Ed Chau and Senator Robert Hertzberg. Writing to “reemphasize what [he] expressed previously to [them] and [state] legislative leaders and Governor Brown,” Attorney General Becerra highlighted what he described as five primary flaws that, if unresolved, will undermine t

Privacy 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Watch how Rachel Tobac hacks an election Machine @defcon

IG Guru

Rachel Tobac? @RachelTobac FollowFollow @RachelTobac [link] At @defcon hacking conference and just learned how easy it is to physically gain admin access on a voting machine that is used in 18 states. Requires no tools and takes under 2 minutes. I’m concerned for our upcoming elections. 1:23 1.8M views 5:27 PM – 11 Aug 2018. The post Watch how Rachel Tobac hacks an election Machine @defcon appeared first on IG GURU.

Access 40
article thumbnail

Sixth Circuit Declines Reconsideration of American Tooling Center’s “Spoofing” Win

Hunton Privacy

Recently, the Sixth Circuit rejected Travelers Casualty & Surety Company’s request for reconsideration of the court’s July 13, 2018, decision confirming that the insured’s transfer of more than $800,000 to a fraudster after receipt of spoofed emails was a “direct” loss that was “directly caused by” the use of a computer under the terms of American Tooling Company’s (“ATC’s”) crime policy.

article thumbnail

Critical Flaws in Syringe Pump, Device Gateways Threaten Patient Safety

Threatpost

The Qualcomm Life Capsule Datacaptor Terminal Server and the Becton Dickinson Alaris TIVA Syringe Pump allow remote access without authentication.

article thumbnail

Can new CIO powers improve FITARA compliance?

CGI

Can new CIO powers improve FITARA compliance? harini.kottees…. Thu, 08/30/2018 - 05:50. My colleague Kathleen Turco recently outlined the ways in which new authorities broaden the influence of federal chief information officers (CIOs), in particular the Federal IT Acquisition Reform Act (FITARA) and the Modernizing Government Technology Act. The White House upped the stakes for CIOs with an Executive Order (EO) issued a few months ago that seeks to: Empower agency CIOs to ensure that agency IT s

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Travel Breaches Hit Air Canada and Asia-Pac Hotelier

Threatpost

Air Canada said 20,000 mobile app users have had passport information exposed; and millions have been affected by a breach at Asian hotel giant Huazhu.

article thumbnail

What professional sports (and avocados) can teach utilities about asset data

CGI

What professional sports (and avocados) can teach utilities about asset data. harini.kottees…. Thu, 08/30/2018 - 06:28. Love him or hate him, New England Patriots quarterback Tom Brady is doing something remarkable. Last season, at 40, he became the oldest quarterback to play in a Super Bowl. One of the biggest factors he touts as the secret to his continued peak-level performance is his very specific nutritional regimen (as humorously demonstrated by his superfood power couple avocado + toast c

Risk 40
article thumbnail

Only Good News From Google?

Information Governance Perspectives

Google has launched a brand new feature for its artificially intelligent Google Assistant that’s designed to cheer people up by filtering negative news. Simply ask your phone (or the Google Home speaker) to ‘tell me something good’ and you’ll be given a nice summary of positive stories about people solving real problems. ‘These days we’re […].

article thumbnail

Video: How Automation and Machine Learning Power Future of SIEM

The Security Ledger

In this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market. Job 1: use machine learning and automation to allow customers to make the best use of their human resources. If you want to understand the challenges facing. Read the whole entry. » Related Stories Three Decades On: RSA Labs Sets Course for Future Secure Access as a Business Accelerator: a Conversation w

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Contex Redesigns Website; Visitors Empowered with Valuable Buying Guide Information

Info Source

Chantilly, VA — August 30, 2018 — Contex , the world leader in large format scanning, today announces the launch of its redesigned website. Contex.com now features many new enhancements to help visitors choose a wide format scanning solution that is best suited to their requirements. From scanning artwork, photos and books to CAD, GIS, drawings and maps, visitors can easily identify the ideal wide format scanning solution to help achieve their goals.

Sales 40
article thumbnail

Automation, Machine Learning Power Future of SIEM

The Security Ledger

In this interview with The Security Ledger, Amy Blackshaw of RSA talks about how the company’s Netwitness SIEM product is evolving to keep pace with a fast -evolving security market. Job 1: use machine learning and automation to allow customers to make the best use of their human resources. If you want to understand the challenges facing. Read the whole entry. » Related Stories Three Decades On: RSA Labs Sets Course for Future Secure Access as a Business Accelerator: a Conversation w

article thumbnail

'Celebgate' Hacker Heading to Prison

Dark Reading

Connecticut man gets eight months for role in attack involving leak of personal celebrity photos, including those of actress Jennifer Lawrence.

44
article thumbnail

Android OS API-Breaking Flaw Offers Useful WiFi Data to Bad Actors

Threatpost

Armed with the information, adversaries can explore and attack the local WiFi network, or identify and physically track any Android device.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Pen Test Tool Tricks Targets with Microsoft WCX Files

Dark Reading

The open-source tool lets penetration testers gather credentials by convincing targets to open a Microsoft WCX file.

49
article thumbnail

Beyond the hype, AI will spark a marketing renaissance

Information Management Resources

Artificial intelligence will scale existing data-driven marketing approaches and give modern CMOs the ability to personalize branded experiences in real time at scale.

article thumbnail

Lessons From the Black Hat USA NOC

Dark Reading

The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.

42