Wed.Jan 17, 2018

article thumbnail

BlackBerry in Motion: Firm Aims to Secure Cars From Hackers

Data Breach Today

With Jarvis, BlackBerry Targets Connected - and Driverless - Vehicle Security BlackBerry mobile devices have become a rare sight. But drivers of Audi, GM and Mercedes vehicles may be using the company's embedded operating system in their cars, and with a new tool called Jarvis, BlackBerry is also making a play to secure the code used to drive autonomous vehicles.

Security 133
article thumbnail

GDPR will be a harsh wake-up call for most U.S. companies

Information Management Resources

Recent studies suggest only one-in-four organizations are well-prepared for the data management mandate, a statistic that could have costly consequences.

GDPR 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Some Healthcare Entities Pay Ransoms

Data Breach Today

Indiana Hospital Pays After Ransomware Attack, Citing Time Needed to Restore Systems A recent incident involving an Indiana hospital that publicly admitted to paying a $55,000 ransom to unlock data following a ransomware attack - despite having backup systems - highlights the need to test data recovery plans.

article thumbnail

Guest Post - Three Critical Steps for GDPR Compliance

AIIM

This is the eighth post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 83
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Anatomy of a Cryptocurrency Phishing Campaign

Data Breach Today

North Korea Keeps Hacking for Bitcoins, Researchers Say Virtual currency that's been surging in value, stored in internet-connected banks and virtual "hot wallets": What could go wrong? The answer includes well over $175 million worth of stolen cryptocurrency and attacks that have been tied to North Korea's Lazarus Group.

Phishing 125

More Trending

article thumbnail

A Venture Capitalist's 2018 Outlook

Data Breach Today

As a longtime investor in companies offering cybersecurity solutions, Alberto Yépez of Trident Capital Cybersecurity is most concerned by a lack of investment in one key area; replacing aged technologies that are supporting critical infrastructure industries, such as power utilities.

article thumbnail

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even.

article thumbnail

Home Office pays out £15,500 to asylum seeker over data breach

The Guardian Data Protection

Sensitive information given by government staff to officials in man’s Middle East home country The Home Office has paid out £15,500 in compensation after admitting handing over sensitive information about an asylum seeker to the government of his Middle East home country, a move which could have endangered his life and that of his family. The settlement relates to confidential proof of his persecution in his home country which was wrongly shared with the authorities there.

article thumbnail

Digital transformation is an opportunity

OpenText Information Management

‘Digital transformation’ can be a polarizing term among organizations. Too often, it conjures thoughts of necessity – trying to implement a new system to meet some complex new piece of regulatory requirements, or scrabbling to replace an aging legacy system on which the company depends. But that’s a faulty way of viewing it. The smartest … The post Digital transformation is an opportunity appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

7 ways ISO 20000 can benefit your organisation

IT Governance

High-quality service is essential in any business, and IT services are no exception. Customers won’t take kindly to downtime, slow performance and delayed requests, so you need to do all you can to keep things running as smoothly as possible. This is where ISO 20000 comes in. It’s the international IT service management (ITSM) standard, and describes the processes and functions that align IT with organisational goals.

article thumbnail

What is Customer Experience Management (CEM)?

OpenText Information Management

There was a time when content almost entirely flowed one way – from enterprises to customers. Customers’ responses were effectively measured in sales and occasional surveys. But in today’s digital world, customers demand a two-way omnichannel customer experience. They expect a customer experience that delights or they will go looking at your competitors.

article thumbnail

PDF Day – January 29

National Archives Records Express

PDF Day, a program with educational sessions designed for Federal agencies and stakeholders, will take place Monday, January 29, at the National Archives in Washington, DC (Archives I) in the William G. McGowan Theater from 9 a.m. to 6 p.m. ET. The PDF Association (PDFA) has been sponsoring an annual PDF Day for the past four years. PDF Day brings industry experts, vendors, and managers together to discuss the importance and utility of the Portable Document Format (PDF)–including its various ISO

article thumbnail

How to write an ISO 22301-compliant business continuity policy

IT Governance

ISO 22301 certification requires organisations to prove their compliance with the standard with appropriate documentation , including a business continuity policy. Key elements of a business continuity policy. Clause 5.3 of the Standard states that organisations must “establish a business continuity policy”. The policy needs to reflect your organisation’s view on business continuity and must: Be appropriate to the purpose of the organisation; Provide the framework for setting business continuity

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Where to Find Security Holes in Serverless Architecture

Dark Reading

Serverless architectures take away business responsibility for server management, but security should still be top of mind.

article thumbnail

Article from a Former Chinese PLA General on Cyber Sovereignty

Schneier on Security

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum. Against the background of globalization and the internet era, the emerging cyber sovereignty concept calls for breaking through the limitations of physical space and avoiding misunderstandings based on perceptions of

article thumbnail

Which CISO 'Tribe' Do You Belong To?

Dark Reading

New research categorizes CISOs into four distinct groups based on factors related to workforce, governance, and security controls.

article thumbnail

Potent Skygofree Malware Packs ‘Never-Before-Seen’ Features

Threatpost

Researchers have discovered Android malware with spy capabilities never seen before such as allowing attackers to capture encrypted WhatsApp chat sessions.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Threats from Russia, North Korea Loom as Geopolitics Spills into Cyber Realm

Dark Reading

Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.

56
article thumbnail

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware

Threatpost

Hackers are exploiting three Microsoft Office vulnerabilities to spread the Zyklon HTTP malware.

59
article thumbnail

Size Does Matter When it Comes to eDiscovery Business Confidence this Winter: eDiscovery Trends

eDiscovery Daily

The Complex Discovery eDiscovery Business Confidence Survey is starting its third year and the results are in! As was the case for the 2016 Winter , Spring , Summer and Fall surveys and the 2017 Winter , Spring , Summer and Fall surveys, the results for the Winter 2018 eDiscovery Business Confidence Survey are published on Rob Robinson’s terrific Complex Discovery site.

IT 46
article thumbnail

Living with Risk: Where Organizations Fall Short

Dark Reading

People tasked with protecting data are too often confused about what they need to do, even with a solid awareness of the threats they face.

Risk 44
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Oracle Ships 237 Fixes in Latest Critical Patch Update

Threatpost

Enterprise applications from Oracle and others could be becoming juicier targets for attackers.

Cloud 52
article thumbnail

Value becomes the 5th “V” in big data factors

Information Management Resources

Organizations will be more focused on finding real returns in their ever-increasing investments in data, and be less intent on adopting the latest Hadoop or data management tools.

article thumbnail

How AI Would Have Caught the Forever 21 Breach

Dark Reading

Companies must realize that the days of the desktop/server model are over and focus on "nontraditional" devices.

47
article thumbnail

9 top trends impacting the data center in 2018

Information Management Resources

The rise of serverless computing, a bigger balance between cloud and local systems, and renewable energy adoption are among the priorities for a growing number of organizations.

Cloud 35
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Rolls Out Security Center for G Suite Enterprise

Dark Reading

New dashboards give admins a look at data such as suspicious device activity and spam email delivery across the business.

article thumbnail

In his “Great Shadow”: Robert Burns’ Legacy

Archives Blogs

Robert Burns’ ability to spontaneously produce musical and poignant verse earned him the title of “Scotland’s Bard,” and ensured that his legacy would remain especially close to that nation’s people and their descendants. Special Collections & Archives’ forthcoming exhibit, “In his ‘Great Shadow’: Robert Burns’ Legacy,” opening January 19th, explores not only the lyrical finesse that led to our remembrance of him, but especially how he is remembered.

article thumbnail

WatchGuard Buys DNS-Filtering Company Percipient Networks

Dark Reading

Percipient's 'Strongarm' to become part of WatchGuard's SMB security services.