Tue.Jun 18, 2019

article thumbnail

Visual Journal: Infosecurity Europe 2019

Data Breach Today

London Conference Tackles Data Breaches, Machine Learning, Cybercrime and More The annual Infosecurity Europe conference this year returned to London. Here are visual highlights from the event, which featured over 240 sessions and more than 400 exhibitors, 19,500 attendees and keynotes covering data breaches, darknets, new regulations and more.

article thumbnail

Is Your Data Safe in the Cloud?

Thales Cloud Protection & Licensing

As organizations move more of their sensitive data to cloud platforms for the efficiency, flexibility and scalability that it promises, security and control continue to be a significant obstacle to this adoption. Although the 2019 Thales Data Threat Report-Global Edition tells us that 90% of organizations report using the cloud and 71% say they are using sensitive data in cloud environments, it also finds that, globally, 60% of organizations surveyed have been breached at some point in their his

Cloud 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A CISO's Insights on Breach Detection

Data Breach Today

Implementing new technologies and best practices can help healthcare organizations dramatically improve their detection of data breaches, says Mitch Parker, CISO of Indiana University Health System, who will be a featured speaker at ISMG's Healthcare Security Summit on June 25 in New York.

article thumbnail

The Evolution of Identity

Dark Reading

How data and technology can help businesses make the right fraud decisions, protect people's identities, and create an improved customer experience.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Protecting Against Automated Attacks

Data Breach Today

Dan Woods of Shape Security on How Enterprises Should Mitigate Risks Dan Woods, vice president of Shape Security, outlines what enterprises can do to protect themselves against automated attacks.

Risk 172

More Trending

article thumbnail

Securing the Software Supply Chain

Data Breach Today

Ilkka Turunen of Sonatype on Addressing Vulnerabilities What steps can be taken to eliminate vulnerabilities in the software supply chain? Ilkka Turunen of Sonatype offers practical insights.

Security 172
article thumbnail

Researcher leaked a dataset of over 7,000,000 transactions scraped from the Venmo public API

Security Affairs

Researcher leaked online a dataset containing over 7,000,000 transactions scraped from the Venmo public API. Venmo is a digital wallet app owned by PayPal that lets you make and share payments with friends. In August 2016, security expert Martin Vigo devised a method to abuse an optional SMS-based feature that allowed users to authorize payments by replying to an SMS message with a provided 6-digit code.

Retail 82
article thumbnail

The Scourge of Commodity Malware

Data Breach Today

Assaf Dahan of Cybereason Analyzes Techniques Assaf Dahan, head of threat research for Cybereason, describes why most malware can be attributed to a small number of techniques.

147
147
article thumbnail

Multiple DoS vulnerabilities affect Linux and FreeBSD

Security Affairs

Netflix researcher has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels that could trigger a DoS condition. Jonathan Looney, a security expert at Netflix, found three Linux DoS vulnerabilities, two of them related to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities, and one related only to MSS.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Using AI to Detect Cyber Risks

Data Breach Today

David Atkinson of Senseon Discusses Key Benefits of Artificial Intelligence Artificial Intelligence is coming of age as a key tool in the security analyst's arsenal, says David Atkinson, founder and CEO of Senseon, who highlights key benefits of the technology.

article thumbnail

DHS also issued an alert for the Windows BlueKeep flaw

Security Affairs

The Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. DHS on Monday issued an alert for the BlueKeep Windows flaw (CVE-2019-0708). After Microsoft and the US NSA , the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. DHS on Monday issued an alert for the BlueKeep Windows flaw ( CVE-2019-0708 ). Experts at the CISA Agency successfully exploited the BlueKeep flaw on a machine running Windows 2000.

article thumbnail

Compliance in a Hybrid Environment

Data Breach Today

Don Closser of Firemon Shares Insights on New Issues in New Era How can organizations deal with compliance issues in a hybrid environment? Don Closser of Firemon discusses compliance in the age of cloud computing.

article thumbnail

Consumers Urged to Junk Insecure IoT Devices

Threatpost

A security researcher who disclosed flaws impacting 2 million IoT devices in April - and has yet to see a patch or even hear back from the manufacturers contacted - is sounding off on the dire state of IoT security.

IoT 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Reinventing Security Awareness Training

Data Breach Today

Want to improve how your organization delivers and absorbs security awareness training? Then it comes down to reinventing your approach, including gamification, says Barracuda's Michael Flouton.

article thumbnail

SHARE @ Pittsburgh: On the road again

Micro Focus

I often go from city-to-city and every time I hit the road I hear this song. You know the one. Of course, our customers are on a road of their own. But instead of being inspired by Willie Nelson or their favorite rock band, it is new business requirements, market demands and the need to. View Article.

article thumbnail

'Extreme But Plausible' Cyberthreats

Data Breach Today

A new report from Accenture highlights five key areas where cyberthreats in the financial services sector will evolve. Many of these threats could comingle, making them even more disruptive, says Valerie Abend, a managing director at Accenture who's one of the authors of the report.

article thumbnail

Expert found a critical RCE zero-day in TP-Link Wi-Fi Extenders

Security Affairs

A zero-day vulnerability affects multiple models of TP-Link Wi-Fi extenders, it could be exploited to remotely execute code. Security expert Grzegorz Wypych from IBM X-Force found a zero-day flaw that affects multiple models of TP-Link Wi-Fi extenders. The Wi-Fi extenders capture the Wi-Fi signal from the main network device and rebroadcast it to areas where the signal is weak.

IoT 70
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A Plan to Stop Breaches With Dead Simple Database Encryption

WIRED Threat Level

Database giant MongoDB has a new encryption scheme that should help slow the scourge of breaches.

article thumbnail

Android Apps uses a novel technique to by-pass 2FA and steal Bitcoin

Security Affairs

Expert discovered a new technique bypassing SMS-based two-factor authentication while circumventing Google’s recent SMS permissions restrictions. The popular security expert Lukas Stefanko from ESET discovered some apps ( namedBTCTurk Pro Beta and BtcTurk Pro Beta) impersonating the Turkish cryptocurrency exchange, BtcTurk, in the attempt of stealing login credentials.

article thumbnail

As Cloud Adoption Grows, DLP Remains Key Challenge

Dark Reading

As businesses use the cloud to fuel growth, many fail to enforce data loss prevention or control how people share data.

Cloud 81
article thumbnail

Working BlueKeep Exploit Developed by DHS

Threatpost

The Department of Homeland Security urged system administrators to update their Windows machines after testing a working BlueKeep exploit for Windows 2000.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Targets Deceptive Sites with New Chrome Tools

Dark Reading

A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud.

71
article thumbnail

Yana Peel, chief executive of London’s Galleries, resigned after discovery of her links with NSO group

Security Affairs

The head of London’s Serpentine Galleries resigned on Tuesday following a Guardian report about her links to the Israeli surveillance firm NSO Group. On Tuesday, the chief executive of London’s Serpentine Galleries, Yana Peel, resigned following the revelation of the Guardian newspaper about her links to the Israeli surveillance firm NSO Group.

Sales 54
article thumbnail

How Not To Prevent a Cyberwar With Russia

WIRED Threat Level

Former cybersecurity officials warn against a path of aggression that could inflame cyberwar rather than deter it.

article thumbnail

Advertising Alliance Plans Protocols to Reduce Dangerous Content

Dark Reading

The Global Alliance for Responsible Media will seek ways to clamp down on dangerous and fake content.

71
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft Management Console Bugs Allow Windows Takeover

Threatpost

Multiple cross-site scripting (XSS) bugs and an XML external entity (XXE) problem opens the door to takeover of admin desktops.

article thumbnail

Can Your Patching Strategy Keep Up with the Demands of Open Source?

Dark Reading

It's time to reassess your open source management policies and processes.

IT 71
article thumbnail

Linux Kernel Bug Knocks PCs, IoT Gadgets and More Offline

Threatpost

Four vulnerabilities could "SACK" connected devices with denial-of-service exploits.

IoT 71