Wed.Jul 18, 2018

article thumbnail

10 Endpoint Security Problems Solved by the Cloud

Data Breach Today

Learn why legacy endpoint security products are creating more problems than they solve. Why are attacks so successful? Legacy endpoint security products are creating more problems than they solve. There is too much cost and complexity, defenses aren't keeping up, and security staff is stretched thin.

Cloud 100
article thumbnail

Malware attacks have doubled in first half of 2018

Information Management Resources

There have been 5.99 billion incidents so far this year, compared to 2.97 billion at the same time in 2017, says a new study.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Make Security Boring Again

Dark Reading

In the public sector and feeling overwhelmed? Focus on the basics, as mind numbing as that may sound.

article thumbnail

Facial Recognition Backlash: Technology Giants Scramble

Data Breach Today

'We Refuse to be Complicit,' Silicon Valley Employees Tell Bosses Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Oracle Sets All-Time Record with July Critical Patch Update

Threatpost

July's critical patch update addresses 334 security vulnerabilities (including 61 rated critical) covering a vast swathe of the Oracle enterprise portfolio.

More Trending

article thumbnail

Meet Jonathan Albright, The Digital Sleuth Exposing Fake News

WIRED Threat Level

Buried in media scholar Jonathan Albright's research was proof of a massive political misinformation campaign. Now he's taking on the the world's biggest platforms before it's too late.

IT 75
article thumbnail

Using Blockchain to Support a New Approach to ID Management

Data Breach Today

Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls "self-sovereign identity.

article thumbnail

Defeating the iPhone Restricted Mode

Schneier on Security

Recently, Apple introduced restricted mode to protect iPhones from attacks by companies like Cellebrite and Greyshift , which allow attackers to recover information from a phone without the password or fingerprint. Elcomsoft just announced that it can easily bypass it. There is an important lesson in this: security is hard. Apple Computer has one of the best security teams on the planet.

article thumbnail

OnDemand Webinar | The Dirty Secrets of Network Firewalls

Data Breach Today

Major insight from around the world on the state of firewalls. Major insight from around the world on the state of firewalls.

100
100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The GDPR: Do you know the difference between personal data and sensitive data?

IT Governance

Now that the EU GDPR (General Data Protection Regulation) has been in effect for a couple of months, you’ve hopefully become acquainted with its definition of personal data: “any information relating to an identified or identifiable natural person”. But what exactly does this mean? And did you know that the GDPR includes a sub-category of sensitive personal data that comes with its own requirements?

article thumbnail

How crooks conduct Money Laundering operations through mobile games

Security Affairs

Experts uncovered a money laundering ring that leverages fake Apple accounts and gaming profiles to make transactions with stolen payment cards. A money laundering ring leverages fake Apple accounts and gaming profiles to make transactions with stolen payment cards and then sells these game premiums on online forums and within gaming communities. The money laundering operation was unveiled by the US Department of Justice, the investigation started in mid-June when the experts from Kromtech Secur

article thumbnail

How to become an ISO 27001 lead implementer

IT Governance

If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer. It’s an advanced cyber security position that comes with a lot of responsibility. You will be tasked with overseeing an ISO 27001 project, managing personnel and making sure you meet the Standard’s requirements along the way.

Risk 66
article thumbnail

Expert discovered RoboCent AWS S3 bucket containing US voters’ records exposed online

Security Affairs

A security researcher has discovered that the US political robocall firm RoboCent exposed personal details of hundreds of thousands of US voters. The US political robocall firm RoboCent exposed personal details of hundreds of thousands of US voters. The researcher Bob Diachenko from Kromtech Security discovered the company database exposed online. The expert was using the online service GrayhatWarfare that could be used to search publicly exposed Amazon Web Services data storage buckets.

Sales 48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to conduct an ISO 27001 internal audit

IT Governance

In order to maintain ISO 27001 compliance, your organisation will need to conduct regular internal audits. This can be tricky at the best of times, but particularly for organisations going through the process for the first time. Unlike the implementation of the Standard, there’s no checklist for what needs to go into an internal audit. The good news is that, with a little research, it’s relatively easy to map your way to audit success.

Paper 65
article thumbnail

US Biggest Blood Testing Laboratories LabCorp suffered a security breach

Security Affairs

Hackers have breached the network at LabCorp, one of the largest diagnostic blood testing laboratories in the US, millions of Americans potentially at risk. The biggest blood testing laboratories network in the US, LabCorp has suffered a security breach. The company announced the incident on Monday, the security breach occurred over the weekend. The hackers breached into the LabCorp Diagnostic systems, but the company says there’s no indication that attackers compromised also the systems used by

article thumbnail

The business case for ISO 27001

IT Governance

Most organisations know the importance of information security, but some struggle to understand what an information security breach would mean from a business management perspective. What is ISO 27001? ISO 27001 is the international standard that describes best practice for an ISMS (information security management system). Achieving ISO 27001 certification verifies that your company’s information security is managed in line with international best practice.

article thumbnail

Smaller Nation State Attacks: A Growing Cyber Menace

Threatpost

While there certainly remains a global hierarchy when it comes to cyber capabilities, smaller state and non-state actors are increasingly exploiting the asymmetric nature of cyberspace to achieve a broad range of objectives.

IT 43
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

From Bullets to Clicks: The Evolution of the Cyber Arms Race

Dark Reading

Cyber strategies have become as important as physical weapons in the battle for political advantage. Here's a quick look at four broad categories.

47
article thumbnail

California Consumer Privacy Act: GDPR Principles Arrive in the U.S.

Daymark

In the wake of the Cambridge Analytica scandal , restrictions on monetization of personal information (aka PI or PII) are coming to California in 2020. The California legislature unanimously passed a historic bill to adopt many of the core privacy principles of the EU General Data Protection Regulation (GDPR) for California consumers. The bill was fast-tracked into law in order to avoid the likely passage of a more rigorous ballot initiative in the November election.

GDPR 40
article thumbnail

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

On July 2017, one of the most devastating incidents in the history of cyber attacks took place when a group of elite hackers hacked into Equifax, one of the largest credit bureaus in the globe and stole private data including social security numbers, credit card numbers etc of around 145 million clients. Such information on the wrong hands can be used for misrepresentation or identity theft.

article thumbnail

EU & JAPAN: Free flow of personal data from EU to Japan soon possible

DLA Piper Privacy Matters

On 17 July 2018 the European Union and Japan agreed to recognise each other’s data protection systems as ‘equivalent’ and to adopt reciprocal adequacy decisions. What is an adequacy decision? An adequacy decision is a decision establishing that a third country provides a comparable level of protection of personal data to that in the European Union.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Amazon Web Services Tests Out Two Tools to Help Keep the Cloud Secure

WIRED Threat Level

Amid frequent customer data exposures, Amazon Web Services is pushing to spot errors and promote access control.

Cloud 52
article thumbnail

Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs

Dark Reading

Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.

48
article thumbnail

How cloud computing changes the role of the CIO

Information Management Resources

IT leaders must make peace with shared decision making while still asserting the need to integrate and secure corporate data.

Cloud 49
article thumbnail

New Subscription Service Takes on Ransomware Protection

Dark Reading

Training and response is the basis of a new offering that addresses ransomware and extortion attacks.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Thousands of U.S. Voter Personal Records Leaked by Robocall Firm

Threatpost

The information was exposed on a public Amazon S3 bucket by a Virginia-based political campaign and robocalling company.

Cloud 44
article thumbnail

Microsoft Moves Up As Phishers' Favorite Target for Brand Spoofing

Dark Reading

Researchers compiled a list of the most common brands to impersonate by detecting and analyzing new phishing URLs.

article thumbnail

LabCorp Investigates a Potential Breach that Could Affect Millions

Threatpost

The nation's largest blood test processor detected “suspicious activity” on its network this past weekend.

IT 44