Tue.Aug 21, 2018

article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

DevOps has been around for a while now, accelerating the creation of leading edge business applications by blending the development side with the operations side. It should come as no surprise that security is being formally added to DevOps, resulting in an emphasis on a process being referred to as SecOps or DevSecOps. Related: How DevOps played into the Uber hack.

article thumbnail

Health Data Breach Victim Tally for 2018 Soars

Data Breach Today

Analyzing the Latest 'Wall of Shame' Trends About 30 new health data breaches - including a phishing attack impacting 1.4 million individuals - have been added in recent weeks to the official federal tally, pushing the total victim count for 2018 so far to 4.3 million.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seven Data Security Challenges You Must Meet to Comply with GDPR

Thales Cloud Protection & Licensing

The enactment of the European Union’s General Data Protection Regulation (GDPR) is a significant milestone for virtually every international business. Under the standard, organizations need to comply withan extensive set of requirements—or potentially face significant fines for failing to do so. Thales eSecurity and DataStax have come together to draft “Aligning GDPR Requirements with Today’s Hybrid-Cloud Realities,” which outlines a number of the issues organizations need to address to be GDPR

GDPR 119
article thumbnail

Google Hit With Lawsuit Over Location Tracking

Data Breach Today

Tech Giant Clarifies: Pausing 'Location History' Alone Won't Stop All Tracking A lawsuit accuses Google of "the surreptitious location tracking of millions of mobile phone users." The legal action was sparked by a report demonstrating that some Google apps tracked and time-stamped users' locations even if a user deactivated the "location history" setting.

150
150
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

7 Serious IoT Vulnerabilities

Dark Reading

A growing number of employees have various IoT devices in their homes - where they're also connecting to an enterprise network to do their work. And that means significant threats loom.

IoT 87

More Trending

article thumbnail

What’s your game plan for AI? 

IBM Big Data Hub

On September 13, Rob Thomas together with ESPN anchor Hannah Storm, will lead a discussion around the transformative potential of AI, the importance of a multi-cloud architecture — and how companies representing a range of industries – from manufacturing to health care — are winning with AI. Attend in person in NYC and enjoy intimate networking and learning sessions – or alternatively catch the Livestream from your home or office.

article thumbnail

GRC in Current Threat Landscape: Identifying New Metrics

Data Breach Today

SAI Global's Andrew Bissett Shares Insights on Security Measures Regulatory compliance and technology innovation are making security more complex, so organizations need to look beyond technical base measures for metrics, says SAI Global's Andrew Bissett.

article thumbnail

Collaboration – not cost – must drive supplier relationship management

OpenText Information Management

The supplier relationship is evolving. In the past, supplier relationship management has been focused on getting the best price from suppliers and creating efficiencies in the supply chain. Now, as organizations move to more integrated partner ecosystems, there’s greater potential to work closely with suppliers, improving agility and innovation. As collaboration takes center stage, are … The post Collaboration – not cost – must drive supplier relationship management appeared fi

65
article thumbnail

Business intelligence is dying: What’s next for analytics?

Information Management Resources

The business intelligence industry is in a free fall. Spend on BI tools will decrease more than 80 percent in 2018, according to the First Half 2018 Market Survey from Nucleus Research.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Wickr Adds New Censorship Circumvention Feature to its Encrypted App

Dark Reading

Open Secure Access addresses void created by Google, Amazon decision to disallow domain fronting, company says.

article thumbnail

Security firm released Singularity, an open source DNS Rebinding attack tool

Security Affairs

Cybersecurity firm NCC Group has released an open source tool for penetration testers that allows carrying out DNS rebinding attacks. Security firm NCC Group has released an open source tool for penetration testing dubbed Singularity of Origin that allows carrying out DNS rebinding attacks. Singularity also aims to raise awareness on how DNS rebinding attacks work and how to protect from them.

article thumbnail

Proving ROI: How a Security Road Map Can Sway the C-Suite

Dark Reading

When executives are constantly trying to cut the fat, CISOs need to develop a flexible structure to improve baseline assessments and target goals, tactics, and capabilities. Here's how.

article thumbnail

How to overcome the potential for unintended bias in data algorithms

Information Management Resources

Anyone that has been online recently may have heard that some scary, biased algorithms are running wild, unchecked. Still, they are sentencing criminals, deciding who gets fired, who gets hired, who gets loans, etc.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook and Twitter Eye Iran in Latest Fake Account Crackdown

WIRED Threat Level

The social media companies removed hundreds of fake accounts with links to Iran and Russia that were engaged in "coordinated inauthentic behavior.".

article thumbnail

"Two Stage" BMW Theft Attempt

Schneier on Security

Modern cars have alarm systems that automatically connect to a remote call center. This makes cars harder to steal, since tripping the alarm causes a quick response. This article describes a theft attempt that tried to neutralize that security system. In the first attack, the thieves just disabled the alarm system and then left. If the owner had not immediately repaired the car, the thieves would have returned the next night and -- no longer working under time pressure -- stolen the car.

article thumbnail

How advanced analytics pulls insights from the weather, part 2

IBM Big Data Hub

The forces of nature can be unpredictable. Businesses & organizations can pull substantial value our of weather data through advanced analytics, machine learning & AI.

article thumbnail

How to Gauge the Effectiveness of Security Awareness Programs

Dark Reading

If you spend $10,000 on an awareness program and expect it to completely stop tens of millions of dollars in losses, you are a fool. If $10,000 prevents $100,000 in loss, that's a 10-fold ROI.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Dark Tequila Banking malware targets Latin America since 2013

Security Affairs

Kaspersky Labs detected a sophisticated piece of banking malware dubbed Dark Tequila that was used to target customers of several Mexican banks. Security experts from Kaspersky Labs have spotted a sophisticated strain of banking malware dubbed Dark Tequila that was used to target customers of several Mexican financial institutions. According to the researchers, the complex Dark Tequila malware went undetected since at least 2013.

Cleanup 46
article thumbnail

Hackers Use Public Cloud Features to Breach, Persist In Business Networks

Dark Reading

Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.

Cloud 52
article thumbnail

Security Flaws On Comcast’s Login Page Exposed Customers’ Personal Information

IG Guru

Posted on August 8, 2018, at 7:48 p.m. ET Comcast Xfinity inadvertently exposed the partial home addresses and Social Security numbers of more than 26.5 million customers, according to security researcher Ryan Stevenson, who discovered the security flaws. Two previously unreported vulnerabilities in the high-speed internet service provider’s online customer portal made it easy for even an unsophisticated hacker […].

article thumbnail

Hackers Leverage AWS To Breach, Persist In Corporate Networks

Dark Reading

Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.

Cloud 51
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

InfoGov Con #2018 – What to Expect

IG Guru

InfoGov Con is celebrating its five year anniversary this fall. The world’s premier event for the strategy of organizational information. Bringing together the disciplines of information risk management and information value extraction, along with organizational leaders tasked with establishing policy and strategy across all organizational information.

Risk 40
article thumbnail

Integro partners with Preservica to provide digital preservation for electronic records

Preservica

New partnership brings together information governance expertise with a proven digital preservation platform to support customers in future-proofing and protecting critical long-term digital records. Boston MA and Oxford, UK – Aug 21 2018 – Digital preservation specialist, Preservica , is pleased to announce that, Integro , award winning experts in information governance and content services solutions, has become a Preservica Service Partner , joining a growing network of partners providing serv

article thumbnail

Utilities Digital Journey Insights (Part 2): Unlocking executive priorities for innovation

CGI

Utilities Digital Journey Insights (Part 2): Unlocking executive priorities for innovation. shobana.lv@cgi.com. Tue, 08/21/2018 - 02:42. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. The findings and perspectives are based on 1,400 in-person interviews with business and IT executives, of which 127 are from the utilities industry.

article thumbnail

Top Human Rights Court Denies Right to be Forgotten in Old Murder Case

HL Chronicle of Data Protection

On June 28, 2018, the European Court of Human Rights decided that Germany had correctly denied two individuals their “right to be forgotten” requests in connection with press archives relating to a 1991 murder. The two individuals were convicted of the murder of a well-known German actor. They were released from prison in 2008 and brought actions against a German radio station and a weekly magazine asking that articles and radio interviews relating to the 1991 murder be removed from

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Toolbox: After a Conference

Adam Shostack

Wow. Blackhat, Defcon, I didn’t even make the other conferences going on in Vegas. And coming back it seems like there’s a sea of things to follow up on. I think a little bit of organization is helping me manage better this year, and so I thought I’d share what’s in my post-conference toolbox. I’m also sharing because I don’t think my workflow is optimal, and would love to learn from how others are working through this in 2018 with its profusion of ways to sta

Sales 40
article thumbnail

Top Human Rights Court Denies Right to be Forgotten in Old Murder Case

HL Chronicle of Data Protection

On June 28, 2018, the European Court of Human Rights decided that Germany had correctly denied two individuals their “right to be forgotten” requests in connection with press archives relating to a 1991 murder. The two individuals were convicted of the murder of a well-known German actor. They were released from prison in 2008 and brought actions against a German radio station and a weekly magazine asking that articles and radio interviews relating to the 1991 murder be removed from

article thumbnail

Join us at the master's conference in london!

Hanzo Learning Center

Whether you’re dealing with e-discovery in a new, socially networked world, find your company expanding globally and thus facing international discovery issues, or planning for the future of e-discovery in your firm or company, you know there’s a divide between what is in practice today and where your firm needs to be in the near future. Legal professionals must develop strategies for spanning this e-discovery divide before it expands further across traditional borders, whether physical or techn