Wed.Sep 26, 2018

article thumbnail

The Best of RSA Conference 2018 APJ

Data Breach Today

A Guide to Video Interviews With Thought Leaders at This Year's Event At RSA Conference 2018 Asia Pacific & Japan, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.

article thumbnail

Mmm. Pi-hole.

Troy Hunt

I have a love-hate relationship with ad blockers. On the one hand, I despise the obnoxious ads that are forced down our throats at what seems like every turn. On the other hand, I appreciate the need for publishers to earn a living so that I can consume their hard-earned work for free. Somewhere in the middle is a responsible approach, for example the sponsorship banner you see at the top of this blog.

Analytics 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR: Data Breach Class Action Lawsuits Come to Europe

Data Breach Today

Breached businesses in Europe: Brace for more class action lawsuits seeking material and non-material damages filed by victims following mandatory data breach notifications under GDPR, says attorney Jonathan Armstrong. He predicts more breach-related suits will succeed in Europe than in the United States.

article thumbnail

Two thirds of organisations unlikely to survive a data breach

IT Governance

Two thirds of UK organisations are uninsured against the financial impact of a data breach, a survey has revealed. The Risk:Value 2018 Report by NTT Security discovered that only 29% of organisations have dedicated cyber insurance in place, despite 81% of senior executives touting insurance against data breaches as “vital”. According to the report, which examines business attitudes to risk and the value of information security, UK businesses would have to spend £1 million, on average, to rec

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Reputational Risk and Third-Party Validation

Data Breach Today

Security ratings are increasingly popular as a means of selecting cybersecurity vendors. But Ryan Davis at CA Veracode also uses BitSight's ratings as a means of benchmarking his own organization for internal and external uses.

Risk 141

More Trending

article thumbnail

Midterm Election Security: Why Patching Is a Critical Issue

Data Breach Today

Many of the computer devices to be used for electronic voting in November's midterm elections have unpatched older operating systems that make them vulnerable, says Darien Kindlund, a data scientist at the cybersecurity firm Insight Engines, which advises governments and others.

article thumbnail

Uber agrees to pay $148 million in massive 2016 data breach settlement

Security Affairs

Uber agrees to $148 million settlement with US States and the District of Columbia over the massive 2016 data breach that exposed personal data of 57 million of its users. In November 2017, the Uber CEO Dara Khosrowshahi announced that hackers broke into the company database and accessed the personal data (names, email addresses and cellphone numbers) of 57 million of its users, the disconcerting revelation was that the company covered up the hack for more than a year.

article thumbnail

Owning Security in the Industrial Internet of Things

Dark Reading

Why IIoT leaders from both information technology and line-of-business operations need to join forces to develop robust cybersecurity techniques that go beyond reflexive patching.

article thumbnail

Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak

Security Affairs

Former NSA TAO hacker was sentenced to 66 months in prison because he leaked top-secret online documents related to the US government ban on Kaspersky. A former member of the NSA’s Tailored Access Operations hacking team was sentenced to 66 months in prison because he leaked top-secret online documents related to the US government ban on Kaspersky software.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Developing IoT Policy from California to Washington, D.C.

Data Matters

The growing network of internet of things (IoT) devices is expected to reach 30 billion devices by 2020. Despite this tremendous growth, the state of IoT regulation is patchwork at best. Although the FTC is the primary security regulator for consumer IoT devices, there are no comprehensive regulations or laws specific to the unique challenges of the IoT market.

IoT 68
article thumbnail

Mutagen Astronomy Linux Kernel vulnerability affects Red Hat, CentOS, and Debian distros

Security Affairs

A new integer overflow vulnerability found in Linux Kernel. Dubbed Mutagen Astronomy, it affects Red Hat, CentOS, and Debian Distributions. Security researchers have discovered a new integer overflow vulnerability in Linux Kernel, dubbed Mutagen Astronomy, that affects Red Hat, CentOS, and Debian Distributions. The vulnerability could be exploited by an unprivileged user to gain superuser access to the targeted system.

Access 88
article thumbnail

USB Drives Remain Critical Cyberthreat

Dark Reading

USB thumb drives may be used less frequently than before, but they are still commonly used as infection vectors for a wide variety of malware.

83
article thumbnail

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking

WIRED Threat Level

Apps need your explicit permission to access your smartphone's motion and light sensors. Mobile websites? Not so much.

Access 94
article thumbnail

How to Leverage AI for Actionable Insights in BI, Data, and Analytics

In the rapidly-evolving world of embedded analytics and business intelligence, one important question has emerged at the forefront: How can you leverage artificial intelligence (AI) to enhance your application’s analytics capabilities? Imagine having an AI tool that answers your user’s questions with a deep understanding of the context in their business and applications, nuances of their industry, and unique challenges they face.

article thumbnail

Google Vows Privacy Changes in Chrome Browser After User Backlash

Threatpost

The tech giant promised that it will be more transparent about users' data in Chrome 70 after coming under fire for its privacy policies earlier this week.

Privacy 78
article thumbnail

Goodbye imaging; hello better IT workflows

Jamf

Discover why modern deployment methods are rendering imaging a thing of the past, and learn how you can replace imaging workflows with superior provisioning practices.

IT 72
article thumbnail

Critical Linux Kernel Flaw Gives Root Access to Attackers

Dark Reading

All versions of Red Hat Enterprise Linux, CentOS vulnerable to 'Mutagen Astronomy' flaw, according to Qualys.

Access 91
article thumbnail

Texas Archives Month and Electronic Records Day

The Texas Record

Mark your calendars! The Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) are offering a bountiful harvest of free and low-cost learning opportunities in October. Whether you prefer learning at a live event or from your desk, there are resources available for you, your colleagues, and your agency staff to increase your records management and information technology knowledge.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

VPNFilter’s Arsenal Expands With Newly Discovered Modules

Threatpost

Seven new modules discovered in VPNFilter further fill in the blanks about how the malware operates and reveals a wider breath of capabilities.

IoT 76
article thumbnail

SEC Slams Firm with $1M Fine for Weak Security Policies

Dark Reading

This is the first SEC enforcement cracking down on violation of the Identity Theft Red Flags Rule, intended to protect confidential data.

article thumbnail

Australia's spyware law could expose phones to exploitation, business group warns

The Guardian Data Protection

Peter Dutton warned bid to boost government’s surveillance powers could give criminals more tools Peter Dutton’s proposed legislation to expand the government’s surveillance capabilities into telecommunication devices through the inclusion of spyware risks could create “systemic weakness or vulnerability” that would be open to exploitation, Australia’s peak industry group has warned.

article thumbnail

Uber Agrees to Pay $148 Million in Nationwide Settlement

Dark Reading

Ride-sharing company settles legal cases with 50 states and the District of Columbia for its handling of 2016 data breach.

article thumbnail

Embedded Analytics Insights for 2024

Organizations look to embedded analytics to provide greater self-service for users, introduce AI capabilities, offer better insight into data, and provide customizable dashboards that present data in a visually pleasing, easy-to-access format. To better understand the factors behind the decision to build or buy analytics, insightsoftware partnered with Hanover Research to survey IT, software development, and analytics professionals on why they make the embedded analytics choices they do.

article thumbnail

11 top paying data management & database jobs for 2019

Information Management Resources

Big data still commands big salaries, with top big data engineers expected to earn more than $200,000 heading into 2019. Here's what to expect for 10 other leading data management and database jobs.

article thumbnail

A 'Cyber Resilience' Report Card for the Public Sector

Dark Reading

Government agencies are making great strides in defending themselves against cyberattacks, according to new research from Accenture. But technology alone won't solve the problem.

article thumbnail

The OpenText platform

OpenText Information Management

Our vision is to enable the Intelligent and Connected Enterprise and inspire a new way to work inside the enterprise. Our focus is on empowering the world’s largest businesses to unlock the potential of their information, while protecting its value. The latest release of OpenText EIM, Release 16, integrates secure and intelligent content services, business … The post The OpenText platform appeared first on OpenText Blogs.

article thumbnail

VPNFilter Evolving to Be a More Dangerous Threat

Dark Reading

VPNFilter malware is adding capabilities to become a more fully-featured tool for threat actors.

69
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Getting to ROI with artificial intelligence in the enterprise

Information Management Resources

The hype around artificial intelligence today is exciting but it also creates confusion, misinformation and skepticism in the minds of both data scientists and their business colleagues.

article thumbnail

Inside Microsoft Azure Sphere

Dark Reading

Microsoft engineer details how the company's IoT security solution operates - at multiple layers starting with the microcontroller.

IoT 58
article thumbnail

2018 Has Been Open Season on Open Source Supply Chains

Threatpost

Hackers see green field opportunities in vulnerable software supply chains.