Thu.Jan 25, 2018

article thumbnail

Ransomware Outlook: 542 Crypto-Lockers and Counting

Data Breach Today

Crypto-Lockers Remain Serious Threat Despite Recent Attack Volume Decline After spiking in 2017, the volume of attacks involving ransomware has since declined, but the malware still remains a potent threat. For attackers, ransomware barriers to entry are lower than ever, thanks to highly automated ransomware-as-a-service offerings.

article thumbnail

Why invest in custom file folders ?

TAB OnRecord

Getting the folder that meets your needs goes a long way to making sure your filing system is as functional as possible when it comes to workflow, retrieval, and security. If you are wondering if custom folders are a good fit for your organization, consider how they can help in the following areas: Read More. The post Why invest in custom file folders ?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New HHS Secretary Alex Azar: Will He Shake Up Priorities?

Data Breach Today

Regulatory Experts Size Up What's Ahead The newly confirmed secretary of the Department of Health and Human Services, Alex Azar, has the potential to reset critical national healthcare priorities and policies, including those related to security and privacy. But what action will he take regarding HIPAA enforcement and other issues?

Privacy 100
article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Deception Technology: Clearing Up Myths

Data Breach Today

Deception technology can play an important role in intrusion detection because it can help track lateral movements of intruders, says Felix Mohan, CEO at CISO Cybersecurity, who clears up some myths about the technology.

More Trending

article thumbnail

Cyber attacks are now one of the biggest threats to global society

IT Governance

A recent article about the World Economic Forum’s Global Risks Report 2018 said that “the top five risks to global stability over the next five years are natural disasters, extreme weather, cyberattacks, data fraud, and failure to address climate change”. The past few years have seen an increase in cyber attacks and their associated damages. The report’s findings suggest that this acceleration is unlikely to slow.

Risk 83
article thumbnail

Top four reasons to start AB testing today

OpenText Information Management

In recent years, the pressure applied to marketers has grown significantly. Year over year, goals are handed down and marketers are expected to do more with less. This trend often leaves marketers scrambling to find new ways to meet these goals. What’s more, in today’s digital ecosystem, with an abundance of options, visitors have come … The post Top four reasons to start AB testing today appeared first on OpenText Blogs.

article thumbnail

NHS Wales suffers “widespread failure” of IT systems

IT Governance

NHS hospitals across Wales suffered a “widespread failure in computer systems”, the BBC reports. Hospital staff were unable to access the NHS’s internal portal, plunging the hospitals into “chaos”. “I can’t do anything. I need this system for everything,” one GP said. The National Cyber Security Centre told the BBC that the issue was not caused by a cyber attack, but was the result of technical issues.

IT 72
article thumbnail

Regulatory Matters: EU regulatory change is coming fast in Life Sciences

OpenText Information Management

The Life Sciences sector is used to constant regulatory change. However, the next few years are about to see major new legislation in the EU that could result in major disruption to Life Sciences, Pharmaceutical and Healthcare companies – wherever they are. As I mentioned in my previous blog, I’m going to concentrate on two … The post Regulatory Matters: EU regulatory change is coming fast in Life Sciences appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Protection of Privilege in the Aftermath of a Data Breach

Data Matters

On Jan. 3, the United States Court of Appeals for the Sixth Circuit issued a decision that effectively required a company to turn over materials relating to a privileged forensic data breach investigation because, the court concluded, the company had implicitly waived privilege when it disclosed certain of the forensic firm’s conclusions in response to a discovery request.

article thumbnail

Success through collaboration

OpenText Information Management

Engineers in the semiconductor, oil and gas and other industries are using graphic intense engineering software that runs on UNIX, Linux or Windows. Engineering teams are often dispersed all over the world and so they need easy ways of collaboration to get their job done. OpenText™ Exceed TurboX (ETX) provides fast and secure web access … The post Success through collaboration appeared first on OpenText Blogs.

Access 71
article thumbnail

How to deliver hassle free risk assessments

IT Governance

To ensure that the cyber security controls your organisation has chosen are appropriate to the risks it faces, a risk assessment should be carried out. This risk assessment consists of identifying, analysing and evaluating risk. If your organisation does not have a risk assessment to inform your cyber security controls, you may be wasting time, effort and resources, as you could be protecting yourself against events that are unlikely to occur or will have little impact on your organisation.

Risk 66
article thumbnail

Hybrid use cases to dominate machine learning in 2018, part 2

IBM Big Data Hub

Big Data and Analytics Hub spoke with IBM Distinguished Engineer John Thomas (@johnjaithomas) about some of the importance of tuning information architecture to make algorithms meet enterprise needs, as well as how machine learning can most effectively be applied in hybrid scenarios in 2018.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Data transfers under the GDPR after Brexit

IT Governance

Under the General Data Protection Regulation (GDPR) , the transfer of personal data outside the EU is only allowed to countries that the European Commission deems provide an “adequate” level of personal data protection. In a notice issued on 9 January 2018, the Commission reminded all parties that the UK will become a third country post-Brexit (March 2019), and any cross-border data flows between the EU and the UK may no longer carry automatic adequate safeguards.

GDPR 61
article thumbnail

HQ2 and the Right-to-Know

The Schedule

Regardless of what camp you find yourself in on the topic of Amazon’s HQ2 courtship with North American cities , the process has triggered open record requests and questions about the degree to which cities are required to disclose the documentation of their overtures to the corporate giant. This is especially true in Pittsburgh, where inclusion of the region’s bid, titled PGHQ2 , as one of 20 finalist cities led to renewed demand for the full proposal to be released via the state’s open records

article thumbnail

Leicester Council exposes vulnerable people’s details in data breach

IT Governance

Leicester City Counci have launched an investigation after an email with highly sensitive, confidential data attached was sent to 27 taxi companies. The attachment is said to have included information on a number of vulnerable people, including children. The email was sent on Tuesday, 9 January. Twenty-four hours later a further email was sent asking for the original email to be deleted without being read or opened, and to also delete it from the deleted items folder.

article thumbnail

Ransomware Detections Up 90% for Businesses in 2017

Dark Reading

Last year, cybercriminals shifted from consumer to enterprise targets and leveraged ransomware as their weapon of choice.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Firefox, Chrome Patch Vulnerabilities, Add Security Features

Threatpost

Dueling browsers, Mozilla Firefox and Google Chrome, have patched bugs and beefed up security.

article thumbnail

How Containers & Serverless Computing Transform Attacker Methodologies

Dark Reading

The pace of hacker innovation never slows. Now security technologies and methods must adapt with equal urgency.

article thumbnail

ASUS Patches Root Command Execution Flaws Haunting Over a Dozen Router Models

Threatpost

ASUS patched a bug that allowed attackers to pair two vulnerabilities to gain direct router access and execute commands as root.

Access 57
article thumbnail

Meltdown & Spectre: Computing's 'Unsafe at Any Speed' Problem

Dark Reading

Ralph Nader's book shook up the automotive world over 50 years ago. It's time to take a similar look at computer security.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Automotive tough times ahead….

CGI

Automotive tough times ahead…. p.butler@cgi.com. Thu, 01/25/2018 - 15:09. Hardly a week goes by without some news regarding the car industry; whether it’s the previous months’ new car sales or one of the leading car manufacturers tying up with (or buying) a tech or taxi company. It’s difficult to keep up with the real developments, and sort out the real news from the noise.

article thumbnail

The Thankless Life of Analysts

The Falcon's View

There are shenanigans afoot, I tell ya; shenanigans! I was recently contacted by an intermediary asking if I'd be interested in writing a paid blog post slamming analysts, to be published on my own blog site, and then promoted by the vendor. No real details were given other than the expectation to slam analyst firms, but once I learned who was funding the initiative, it became pretty clear what was going on.

article thumbnail

FERC Proposes to Adopt Reliability Standards Designed to Mitigate Cybersecurity Risk

Hunton Privacy

On January 18, 2018, the Federal Energy Regulatory Commission (“FERC”) issued a Notice of Proposed Rulemaking (“NOPR”) that proposes the adoption of new mandatory Reliability Standards designed to mitigate cybersecurity risk in the supply chain for electric grid-related cyber systems. The Reliability Standards were developed by the North American Electric Reliability Corporation (“NERC”) in response to FERC Order No. 829 , which ordered the development of standards to address supply chain risk m

Risk 40
article thumbnail

EU: Are exam answers personal data?

DLA Piper Privacy Matters

In December 2017 the Second Chamber of the Court of Justice reached a decision in the well-known case of Peter Nowak against the Data Protection Commissioner [1]. The case started with a request for a preliminary ruling under Article 267 TFEU from the Supreme Court in Ireland. The key issue was the uncertainty of whether the result of an exam may or may not be considered a certain type of personal data.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Opportunity to Comment: Draft ERM Federal Integrated Business Framework and Use Cases for Electronic Messages

National Archives Records Express

We are requesting comments on two draft documents as part of our Federal Electronic Records Modernization Initiative (FERMI). The documents are the Electronic Records Management Federal Integrated Business Framework (ERM-FIBF) (Excel spreadsheet) and the Use Cases for Electronic Messages (Word document). Through FERMI, we have been working to improve the way agencies acquire ERM services and solutions.

article thumbnail

Industrial Safety Systems in the Bullseye

Dark Reading

TRITON/TRISIS attack on Schneider Electric plant safety systems could be re-purposed in future attacks, experts say.

50
article thumbnail

Why corporate IT groups can’t ignore customer data platforms

Information Management Resources

CDPs are packaged software that collects customer data from multiple source systems, combines it to create a complete view and makes the resulting database available to other systems.

IT 38