Fri.Feb 23, 2018

article thumbnail

SEC Releases Updated Cybersecurity Guidance

Data Breach Today

Regulator Demands More Risk Disclosure, Better Insider Trading Policies The U.S. Securities and Exchange Commission has released revised guidance "to assist public companies in preparing disclosures about cybersecurity risks and incidents." It includes new prohibitions on trading in corporate shares after a breach has been discovered but before investors have been notified.

article thumbnail

What Rick Gates' Guilty Plea Means For Mueller’s Probe

WIRED Threat Level

Paul Manafort’s longtime deputy is cooperating with the special prosecutor, so we may soon have answers to these questions hovering around the Russia investigation.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lessons From Recent HIPAA Settlements

Data Breach Today

What are the top security lessons that covered entities and business associates should learn from the latest HIPAA settlements? Illiana Peters, a former top HIPAA enforcer, shares her insights.

Security 113
article thumbnail

Facebook's Mandatory Anti-Malware Scan Is Invasive and Lacks Transparency

WIRED Threat Level

Facebook is locking users out of their accounts until they download antivirus software that sometimes doesn't even work on their computers.

Security 108
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Out for Justice: Feds Battle Trolls

Data Breach Today

Leading the latest edition of the ISMG Security Report: The Department of Justice indicts Russians for allegedly running an industrialized troll factory designed to influence U.S. politics. Also, a feature in Australia's new real-time payment system could be abused by identity thieves.

Security 100

More Trending

article thumbnail

Is your staff’s cyber security awareness up to scratch?

IT Governance

Cyber attacks and data breaches are on the rise, and it’s easy to believe they’re all caused by criminal hackers out for financial gain. However, this isn’t the case. Last quarter, it was found that four of the five leading causes of data breaches are because of human or process error. The failure of staff to follow workplace security regulations, as well as criminal hackers finding more ways to exploit members of staff, is becoming an increasing problem.

article thumbnail

10 Can't-Miss Talks at Black Hat Asia

Dark Reading

With threats featuring everything from nation-states to sleep states, the sessions taking place from March 20-23 in Singapore are relevant to security experts around the world.

article thumbnail

Visit OpenText at the Salesforce World Tour this spring

OpenText Information Management

We are just days away now from the start of a busy spring for Salesforce, its customer and partners. Their World Tour event hits the road in Sydney on March 6th and OpenText will be there amongst the crowds. Meet OpenText, myself and our team at these World Tour stops: Sydney – March 6th, 2018 … The post Visit OpenText at the Salesforce World Tour this spring appeared first on OpenText Blogs.

article thumbnail

Beware This Incredibly Silly—But Still Effective—Tax Scam

WIRED Threat Level

There are lots of tax scams out there, but this is the only one that pays you first.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

62% of organisations unaware of the GDPR

IT Governance

There is an alarming lack of awareness across all industries about the EU General Data Protection Regulation (GDPR) , according to a government survey. Almost two thirds (62%) of respondents hadn’t heard of the Regulation, and only about 10% had taken steps to meet its compliance requirements. The survey split respondents into businesses and charities.

GDPR 63
article thumbnail

Election Security

Schneier on Security

I joined a letter supporting the Secure Elections Act (S. 2261): The Secure Elections Act strikes a careful balance between state and federal action to secure American voting systems. The measure authorizes appropriation of grants to the states to take important and time-sensitive actions, including: Replacing insecure paperless voting systems with new equipment that will process a paper ballot; Implementing post-election audits of paper ballots or records to verify electronic tallies; Conductin

article thumbnail

Weekly Update 75

Troy Hunt

Every now and then, I look at one of the videos I've just recorded and only realise then how tired I look. This was one of those weeks and it was absolutely jam-packed! There was some awesome stuff and there was some very frustrating stuff. Let me add briefly to the latter here: The joy of participating in online communities is that we have these melting pots of diverse backgrounds and ideas all coming together in the one place.

article thumbnail

Drupal Patches Critical Bug That Leaves Platform Open to XSS Attack

Threatpost

Drupal has patched several vulnerabilities – both moderately critical and critical – in two versions of its content management system platform.

CMS 52
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

93% of Cloud Applications Aren't Enterprise-Ready

Dark Reading

The average business uses 1,181 cloud services, and most don't meet all recommended security requirements, Netskope says.

Cloud 55
article thumbnail

FTC Issues Tips on VPN Apps

Hunton Privacy

On February 22, 2018, the Federal Trade Commission (“FTC”) published a blog post that provides tips on how consumers can use Virtual Private Network (“VPN”) apps to protect their information while in transit over public networks. The FTC notes that some consumers are finding VPN apps helpful in protecting their mobile device traffic over Wi-Fi networks at coffee shops, airports and other locations.

article thumbnail

'OMG': New Mirai Variant Converts IoT Devices into Proxy Servers

Dark Reading

The new malware also can turn bots into DDoS attack machines, says Fortinet.

IoT 67
article thumbnail

FBI Warns of Spike in W-2 Phishing Campaigns

Threatpost

A recent FBI public service advisory warned of an increase in reports of compromised or spoofed emails involving W-2 forms.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

State Records Center Featured on Local Radio

The Texas Record

We were pleased to see our own State Records Center building on Shoal Creek featured on the local radio station KUT 90.5 this morning. We were also pleased to see the comparison to the final scenes in the movie Raiders of the Lost Ark. Manager Michael Shea was interviewed and provided a tour to the show host and a citizen who was curious about the building.

IT 40
article thumbnail

Inside Synthetic Identity Fraud: Today’s Big Threat

Rippleshot

Since the fallout of the Equifax breach, the chatter in the financial services industry has been all about identity fraud. The same sentiment was echoed in a recent study by Javelin. According to that study, for the first year ever, data breaches compromised more Social Security Numbers than credit card numbers. SSNs accounted for 35 percent, while credit card numbers rang in at 30 percent in breaches.

article thumbnail

Leveraging Security to Enable Your Business

Dark Reading

When done right, security doesn't have to be the barrier to employee productivity that many have come to expect. Here's how.

article thumbnail

How a Data Protection Impact Assessment Helps You Comply with GDPR

eSecurity Planet

How to conduct a data protection impact assessment (DPIA) and why it is critical for GDPR compliance.

GDPR 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

From retail to real estate: Reinventing industries with public data

Information Management Resources

The new world of public information - where the data is fast, accessible and cheap (or free) - is revolutionizing the way many firms learn, grow and compete.

Retail 43
article thumbnail

Visa: EMV Cards Drove 70% Decline in Fraud

Dark Reading

Merchants who adopted chip technology saw a sharp decline in counterfeit fraud between 2015 and 2017, Visa reports.

45
article thumbnail

Supporters of Net Neutrality Vow to Fight Rule Changes

Threatpost

The FCC’s rollback of network neutrality regulations is set to be complete in April, but it won't happen without a fight.

IT 42
article thumbnail

Enabling Better Risk Mitigation with Threat Intelligence

Dark Reading

In order to get the maximum benefit from threat intel you need to be able to operationalize it. Here's how.

Risk 44
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Using customer data platforms to monetize information

Information Management Resources

CDPs enable reliable and standardized data to inform consistent, data-driven customer engagements, which is where data becomes information.

36
article thumbnail

What is Florida High?

Archives Blogs

Demonstration School. Since its inception, Florida State University has been involved in teaching high school aged students in addition to college students. When the legislature voted in 1851 to create two institutions of higher learning in Florida, Tallahassee began to organize a bid to have one of the schools established in town. The first page of The Trident from February 10, 1967. [ original item ].

article thumbnail

‘The AI body snatchers have already taken over’

Information Management Resources

Artificial intelligence is expected to bring financial services to millions, yet it could also make unethical decisions that unfairly deny credit and widen the divide between haves and have-nots, says Nicolas Economou of the nonprofit Future Society.