Thu.Mar 01, 2018

article thumbnail

Leak of 23,000 Private Keys Triggers Security Scramble

Data Breach Today

Digital Certificate Revocation Blame Game: Trustico Swaps Blows With DigiCert Digital certificate vendor Trustico is sparring with DigiCert, which recently took over Symantec's digital certificate business, following a serious security incident. The private keys for at least 23,000 Trustico digital certificates have been compromised, prompting a scramble to protect affected websites.

Security 183
article thumbnail

Securing Containers for GDPR Compliance

Thales Cloud Protection & Licensing

Around the world, enterprises are anxious about May 25, 2018, the day enforcement begins for the European Union’s General Data Protection Regulation (GDPR). They have good reason. Perhaps the most comprehensive data privacy standard to date, the GDPR presents a significant challenge for organizations that process the personal data of EU citizens – regardless of where the organization is headquartered or processes the data.

GDPR 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Reportedly Launches Cryptocurrency Probe

Data Breach Today

Report: Dozens of Firms and Advisers Behind Initial Coin Offerings Receive Subpoenas The U.S. Securities and Exchange Commission has reportedly issued dozens of subpoenas and requests for information to technology companies, executives and advisers involved in initial coin offerings. The regulator's new cyber unit investigates ICOs, which attempt to raise funds for cryptocurrency ventures.

Security 145
article thumbnail

Color-coded filing systems: Reduce downtime and increase ROI – Part 1

TAB OnRecord

In 1967, TAB launched CompuColor® labeling products for application in computer punch cards. Forty-five years later, punch cards are computing history, but color-coded filing techniques are still an integral part of effective information management. What is it that allows color-coding to transcend its original purpose and remain popular four decades later?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HIMSS18: The Cybersecurity Agenda

Data Breach Today

A Look at What's Available at This Year's Biggest Health IT Event Cybersecurity will again be in the spotlight at this year's Healthcare Information and Management Systems Society conference, March 5 to 9 in Las Vegas. The event will feature numerous CISO presentations, updates from regulators and displays of the latest technologies.

More Trending

article thumbnail

Simplifying Advanced Attack Detection

Data Breach Today

Despite the millions of dollars companies invest in cybersecurity programs, advanced persistent attackers constantly devise new means of breaking into corporate environments. How can deception technology offer a new alternative? Ofer Israeli of Illusive Networks explains.

article thumbnail

Chrome's WebUSB Feature Leaves Some Yubikeys Vulnerable to Attack

WIRED Threat Level

While still the best protection against phishing attacks, some Yubikey models are vulnerable after a recent update to Google Chrome.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

If I'm honest, I'm constantly surprised by the extent of how far Have I Been Pwned (HIBP) is reaching these days. This is a little project I started whilst killing time in a hotel room in late 2013 after thinking "I wonder if people actually know where their data has been exposed?" I built it in part to help people answer that question and in part because my inner geek wanted to build an interesting project on Microsoft's Azure.

article thumbnail

How & Why the Cybersecurity Landscape Is Changing

Dark Reading

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Monetary Authority of Singapore Consults on Proposed E-Payments User Protection Guidelines

Data Matters

On Feb. 13, 2018, the Monetary Authority of Singapore (MAS) issued a Consultation Paper on the Proposed E-Payments User Protection Guidelines (Consultation Paper). Under the Consultation Paper, the MAS proposes to issue a set of guidelines (Guidelines) to standardize the protection offered to individuals or micro-enterprises from losses arising from unauthorized or mistaken payment transactions.

Paper 60
article thumbnail

How to choose the best CMS software in 2018

OpenText Information Management

Organizations have to continually improve customer experience while reducing costs and driving innovation. Choosing the Content Management System (CMS) for your organization is key. There are so many capabilities and features to consider that getting it right can be a challenge. This blog will help you decide which features are important when you select your … The post How to choose the best CMS software in 2018 appeared first on OpenText Blogs.

CMS 66
article thumbnail

What's in store for an enterprise architect at Think 2018

IBM Big Data Hub

With businesses requiring foresight into emerging technologies and relying on nimble responses, successful architects must know how to get the most of their data infrastructure and build for the future. That’s exactly why they need to set aside a few days in March to attend Think 2018 in Las Vegas.

61
article thumbnail

Preparing for Brexit: how well do you know your contracts?

OpenText Information Management

Brexit is coming. The United Kingdom faces some intense negotiations in its process of leaving the European Union by March 2019, and we still don’t have a clear idea of what will change. So how can you maximize the strategic value of your contracts? It’s clear that changes will happen and that they will affect … The post Preparing for Brexit: how well do you know your contracts?

IT 61
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Most sought-after certifications for 2018

IT Governance

There is a massive skills shortage in key areas such as IT security, governance and compliance in 2018. This shortfall appears to be exacerbated by changes in government policies and other regulatory pressures and the rise in data breaches. Advance your career this year with training courses from IT Governance. Here are some of the most sought-after certifications for 2018: 1) GDPR Foundation and Practitioner Combination Course: Over 50% of European businesses are unprepared for the General Da

GDPR 57
article thumbnail

Your Records Strategy Should Evolve with Your Business

Gimmal

Think back ten or fifteen years. How many different collaboration systems was your organization using? You were probably handling a lot of paper, trying to empty your email inbox, and storing important files in a document management system. Today, that has all changed. If you’re like most people, you may be working with network file shares, one or more document management systems, an ERP system, an HR system, a CRM system, email, and more!

Paper 56
article thumbnail

Will data management's trends collide or converge in 2018?

IBM Big Data Hub

While the proliferation of data will be readily apparent, deciding what to do in response will be less straightforward. The majority of workloads currently sit in traditional, on-premises environments but we’ll see many of them move to private and public clouds over the next over the next five years.

Cloud 59
article thumbnail

GDPR priorities in the lead up to May

IT Governance

GDPR compliance should be a priority and high on every organisation’s agenda with only three months until the regulation comes into effect on 25 May 2018. Recent research by Ipsos MORI on behalf of the UK government , however showed that only 38% of UK companies were aware of the GDPR and, of those, only about 25% had made a start on their GDPR compliance project.

GDPR 54
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

In the US v. Microsoft Supreme Court Case, an Old Law Leaves Few Good Options

WIRED Threat Level

If oral argument in *US v. Microsoft* proved anything, it's that no one involved wants the courts to decide—including the justices.

IT 68
article thumbnail

Sophisticated RedDrop Malware Targets Android Phones

Threatpost

A new strain of mobile malware found on an array of apps can pull out sensitive data – including audio recordings – from Android phones.

Privacy 60
article thumbnail

Russians Hacked the Olympics

Schneier on Security

Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network and tried to cast the blame on North Korea. Of course, the evidence is classified, so there's no way to verify this claim. And while the article speculates that the hacks were a retaliation for Russia being banned due to doping, that doesn't ring true to me.

IT 51
article thumbnail

A Certified Ethical Hacking Course with a difference

IT Governance

There are many organisations in the UK that offer Certified Ethical Hacking (CEH) training. Unlike the competition, which simply train you for an exam, we focus on building your skills and providing a unique learning experience. Michael Stout, our course trainer, has led CEH courses for more than ten years, and has worked for all the major training centres in the UK and Western Europe.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Number of Sites Hosting Cryptocurrency Miners Surges 725% in 4 Months

Dark Reading

The dramatic increase in cryptocurrency prices, especially for Monero, is behind the sudden explosive growth, says Cyren.

58
article thumbnail

Privacy and Cybersecurity March 2018 Events

HL Chronicle of Data Protection

Please join us for our March 2018 Privacy and Cybersecurity Events. March 6. Standing Post- Spokeo. Hogan Lovells will host a webinar aimed at highlighting strategies companies can employ to defend against consumer, privacy, or data breach lawsuits in the post- Spokeo world. The speakers include Michelle Kisloff , Mark Brennan , Adam Cooke , and Alicia Paller.

Privacy 40
article thumbnail

What Enterprises Can Learn from Medical Device Security

Dark Reading

In today's cloud-native world, organizations need a highly distributed approach that ties security to the workload itself in order to prevent targeted attacks.

article thumbnail

FAQ: Should I adopt TSLAC’s schedules or Create a Custom Schedule?

The Texas Record

One of the most critical decisions you must make as a records management officer at a local government is deciding on a schedule for records retention. This schedule gives you the authority to destroy records. In developing your records retention plan, you must choose from the following three options: Forego a records retention schedule and permanently retain all records.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

ABBYY Announces Partnership with Lifeboat Distribution in the United States, Canada, and Mexico

Info Source

. MILPITAS, Calif; Feb. 27, 2018 – ABBYY ® , a global provider of intelligent capture solutions to improve business outcomes, today announced the partnership with Lifeboat Distribution ® , a value added distributor, providing supply chain services and connecting best-in-breed software publishers with resellers around the globe. The company will distribute ABBYY FineReader and ABBYY Recognition Server in the United States, Canada, and Mexico.

Paper 40
article thumbnail

ICS Under Fire in 2017

Dark Reading

New Dragos report finds rising number of public vulnerability advisories around ICS with not enough reasonable guidance around how to deal with these flaws.

41
article thumbnail

Bug in HP Remote Management Tool Leaves Servers Open to Attack

Threatpost

Firmware versions of HPE’s remote management hardware iLO3 have an unauthenticated remote denial of service vulnerability.

Cloud 48