Mon.Apr 16, 2018

article thumbnail

Leaky Buckets in a Multi-Cloud World

Thales Cloud Protection & Licensing

The past year has seen a number of high profile security breaches tied to leaky storage servers. Specifically, the leakage of sensitive files connected to misconfigured security protocols on Amazon Simple Storage Service (S3) buckets. In fact, in June, a misconfigured database containing the sensitive personal information of 198 million American voters was left exposed online for nearly two weeks.

Cloud 91
article thumbnail

Research finds ransomware attacks are on the rise and proving costly

IT Governance

According to recent research by SentinelOne and Vanson Bourne , 40% of UK companies fell victim to an average of five ransomware attacks in 2017, costing them £329,976 each. The research, looking at UK organisations with at least 1,000 employees, also revealed that the overall number of organisations experiencing ransomware attacks increased from 48% in 2016 to 56% in 2018.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The DMCA and its Chilling Effects on Research

Schneier on Security

The Center for Democracy and Technology has a good summary of the current state of the DMCA's chilling effects on security research. To underline the nature of chilling effects on hacking and security research, CDT has worked to describe how tinkerers, hackers, and security researchers of all types both contribute to a baseline level of security in our digital environment and, in turn, are shaped themselves by this environment, most notably when things they do upset others and result in threats,

IT 51
article thumbnail

Automation and gamification could be key to thwarting cyber threats

Information Management Resources

Nearly half of IT security pros think in the next year they will either struggle to deal with the increase of cyberattacks or that it will be impossible to defend against them.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Huge Malware Distribution Network Crippled

Data Breach Today

'EITest' Shuffled as Many as 2 Million Users a Day to Malware Security researchers are claiming at least a temporary victory over an enormously productive malware distribution scheme that shuffled as many as 2 million users a day from legitimate websites to malware.

Security 145

More Trending

article thumbnail

Using Deception Technology to Stay Ahead of Cyber Threats

Data Breach Today

To stay ahead of evolving cyber threats, healthcare entities need to deploy a defense-in-depth strategy that includes tapping more advanced tools, including deception technology, says security expert Elie Nasrallah of HITRUST.

Security 113
article thumbnail

How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

WIRED Threat Level

New research shows just how prevalent political advertising was from suspicious groups in 2016—including Russian trolls.

Security 111
article thumbnail

Hong Kong Issues EU Data Privacy Law Guidance on the upcoming GDPR

Data Matters

The Hong Kong Office of the Privacy Commissioner for Personal Data (the “ Hong Kong Data Privacy Commissioner ”) has recently published compliance guidance on the upcoming GDPR to raise awareness in Hong Kong companies about the potential effects and reforms needed in order to comply with the new GDPR requirements. The guidance examines the GDPR’s extra-territorial effect on Hong Kong companies that (i) have establishments in the EU, where personal data is processed in accordance with the servic

article thumbnail

Do you know what data your organisation holds?

IT Governance

How can you be sure that your organisation is compliant with the EU General Data Protection Regulation (GDPR) if you don’t know exactly what data you hold? You might think it’s impossible to be unaware of data you store, but you’d be surprised. Information has a way of being left on hard drives, appropriated by other departments or reproduced in different formats.

GDPR 68
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The 4 key capabilities of DAM platforms for manufacturers

OpenText Information Management

In my last blog, I took a look at Digital Asset Management (DAM) and how manufacturers can use this technology to take full advantage of the rich media being created within the supply chain. In this blog, I’m going to suggest 4 key capabilities that you should look for when selecting an enterprise-wide DAM platform. … The post The 4 key capabilities of DAM platforms for manufacturers appeared first on OpenText Blogs.

article thumbnail

An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

WIRED Threat Level

Rube-Goldbergesque IoT hacks are surprisingly simple to pull off—and can do a ton of damage.

IoT 92
article thumbnail

What are the future threats in cyber security?

IT Governance

Last week the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) released their annual report on the cyber threats facing UK businesses. The report examines how cyber activity has impacted UK businesses over the past 12 months and the future threats they will face. Cryptojacking. Cryptojacking is when cryptocurrency miners are delivered through malware, using a computer’s processing power to illicitly mine cryptocurrency.

article thumbnail

The White House Warns on Russian Router Hacking, But Muddles the Message

WIRED Threat Level

By scolding Russia for what looks like typical espionage, the US and UK are blurring red lines in cybersecurity.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly discussion podcast #11: Security in the Digital World

IT Governance

This week’s extract is taken from Graham Day’s book Security in the Digital World. This must-have guide features simple explanations, examples and advice to help you become security-aware in a developing digital world. Discussion Podcast Episode 11 – Security in the Digital World, SMARTPHONES AND TABLETS: “Apple has developed a niche in the smartphone arena with newly released iPhones selling out the minute they hit the shelves.

article thumbnail

FTC Revises Its Security Settlement with Uber

Hunton Privacy

The Federal Trade Commission has modified its 2017 settlement with Uber Technologies, Inc. (“Uber”) after learning of an additional breach that was not taken into consideration during its earlier negotiations with the company. The modifications are based on the fact that Uber failed to notify the FTC of a November 2016 breach, which took place during the time that the FTC was investigating an earlier, 2014 breach.

IT 45
article thumbnail

Microsoft to Roll Out Azure Sphere for IoT Security

Dark Reading

Azure Sphere, now in preview, is a three-part program designed to secure the future of connected devices and powered by its own custom version of Linux.

IoT 49
article thumbnail

Threatpost RSA Conference 2018 Preview

Threatpost

Threatpost's Tom Spring and Lindsey O'Donnell talk about the top security trends that they are watching out for at the 2018 RSA Conference this week in San Francisco.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Large Majority of Businesses Store Sensitive Data in Cloud Despite Lack of Trust

Dark Reading

Researchers report 97% of survey respondents use some type of cloud service but continue to navigate issues around visibility and control.

Cloud 46
article thumbnail

How artificial intelligence is revolutionizing marketing

Information Management Resources

The ability of AI to automatically analyze data can enable marketers to deliver relevant and personalized content, and improve the customer experience at every digital touchpoint.

article thumbnail

Microsoft to Roll Out Azure Sphere for IoT Security

Dark Reading

Azure Sphere, now in preview, is a three-part program designed to secure the future of connected devices and powered by its own custom version of Linux.

IoT 43
article thumbnail

Google Play Boots Three Malicious Apps From Marketplace Tied to APTs

Threatpost

Researchers said three apps used to surveil Middle East targets were booted from the Google Play marketplace.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DevOps May Be Cause of and Solution to Open Source Component Chaos

Dark Reading

DevOps is accelerating the trend of componentized development approaches, but its automation can also help enforce better governance and security.

article thumbnail

3 steps to help ensure your digital transformation efforts succeed

Information Management Resources

These efforts are risky and 90 percent fail. But the payoff could be market-leading products and services that beat out a close competitor or prevent potential disruptors from stealing market share.

article thumbnail

How GDPR Forces Marketers to Rethink Data & Security

Dark Reading

The European regulation is making marketing technology companies re-examine their security, and that's a good thing.

article thumbnail

10 Vendors Making Product Announcements at RSA Conference 2018

eSecurity Planet

There are hundreds of vendors at the RSA Conference. Here are 10 making major product announcements on day one.

40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

INsecurity Conference Seeks Security Pros to Speak on Best Practices

Dark Reading

Dark Reading's second annual data defense conference will be held Oct. 23-25 in Chicago; call for speakers is issued.

article thumbnail

How data breaches affect the corporate bottom line

Information Management Resources

On average, a hack involving personal financial information generates a loss of a little under $1.5 billion in market value, according to a new study from Verizon.

article thumbnail

Companies Still Suffering From Poor Credential Hygiene: New Report

Dark Reading

Credentials are being mis-handled and it's hurting most companies, according to a new report out today.

IT 45