Thu.Jan 04, 2018

article thumbnail

Top 5 Ways to Hack a Business

Data Breach Today

Testing Networks With WannaCry, Petya and EternalRocks Finds Widespread Failures Simulated attacks by an information security testing firm have found that fresh WannaCry, NotPetya and EternalRocks would still rip through many an enterprise network. Here's how organizations must respond.

article thumbnail

Personal data of a billion Indians sold online for £6, report claims

The Guardian Data Protection

Newspaper says it bought access to details from world’s largest biometric database, used to administer public services The personal information of more than a billion Indians stored in the world’s largest biometric database can be bought online for less than £6, according to an investigation by an Indian newspaper. The reported breach is the latest in a series of alleged leaks from the Aadhaar database, which has been collecting the photographs, thumbprints, retina scans and other identifying de

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Trends Cybersecurity Practitioners Must Address in 2018

Data Breach Today

A look ahead at five trends that should have a significant impact on cybersecurity in 2018 is featured in the final ISMG Security Report for 2017. Cybersecurity and privacy thought leader Christopher Pierson forecasts the likely occurrences.

article thumbnail

John Daly AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name John Daly. Email jdaly@stlmsd.com. LinkedIn Profile [link]. Job Title Information Governance Manager. Company Metropolitan St. Louis Sewer District. Can you give us a sneak peek into your AIIM18 Presentation?

Paper 81
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Meltdown and Spectre: Patches and Workarounds Appear

Data Breach Today

Makers of Operating Systems, Devices and Cloud Services Rush Fixes Microprocessor makers Intel, ARM and AMD, as well as operating system and software developers and makers of smartphones and other devices, are rushing to prep, test and ship fixes for the serious CPU flaws exploitable via Meltdown and Spectre attacks.

Cloud 154

More Trending

article thumbnail

Do Verizon and Sprint Make It Too Easy for ID Thieves?

Data Breach Today

No ID Required for High-Value Purchases Through Telesales Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?

IT 138
article thumbnail

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that.

Security 111
article thumbnail

Recalling 9 Years of Cybersecurity News and Analysis

Data Breach Today

This episode of the ISMG Security Report is devoted to producer/host Eric Chabrow's recollection of the evolution of cybersecurity news and analysis during his nine years at Information Security Media Group. Chabrow is retiring after 45 years in journalism.

article thumbnail

Get a jump start on real-time analytics and insights

IBM Big Data Hub

Unlock the trusted information about your customers with MDM and empower your business analysts to search, explore and match with other data collections with governed freedom.

MDM 84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Health Data Privacy and Security: What Will 2018 Bring?

Data Breach Today

Privacy Expert Rebecca Herold Offers Trend Outlook for the New Year So, what can we expect next year? Privacy expert Rebecca Herold offers her predictions for the 11 most significant healthcare information security and privacy events that will occur throughout 2018.

Privacy 113
article thumbnail

Gartner declares enterprise-level cloud faxing is on the Hype Cycle Slope of Enlightenment

OpenText Information Management

In its recently published report, “Five Emerging Use Cases to Drive Cloud Fax ROI”(August 2017), Gartner states, “While ad hoc use of fax is generally observed to be diminishing, enterprise use of fax for high-volume, production fax processes has remained steady, or in some cases has increased as enterprises find new use cases for the … The post Gartner declares enterprise-level cloud faxing is on the Hype Cycle Slope of Enlightenment appeared first on OpenText Blogs.

Cloud 68
article thumbnail

HIPAA Enforcement: The 2018 Outlook

Data Breach Today

Why Making a Prediction Is So Difficult So what actions can we expect in 2018 from the Department of Health and Human Services' Office for Civil Rights as it enforces the HIPAA privacy, security and breach notification rules? Making a prediction is difficult, given all the changes at HHS.

Privacy 113
article thumbnail

Spectre and Meltdown Attacks

Schneier on Security

After a week or so of rumors, everyone is now reporting about the Spectre and Meltdown attacks against pretty much every modern processor out there. These are side-channel attacks where one process can spy on other processes. They affect computers where an untrusted browser window can execute code, phones that have multiple apps running at the same time, and cloud computing networks that run lots of different processes at once.

Cloud 69
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Risk Management: Taking a 'Surgical' Approach

Data Breach Today

CISOs need to precisely tailor their risk management strategies to protect the specific high-value assets of their organization; a broad-brushed approach will never work, says UK-based Kelly Bissell, managing director and global lead, Accenture Security.

Risk 113
article thumbnail

Weekly podcast: A recap of the top stories of 2017 and a look ahead to 2018

IT Governance

This week, we look back at the big news from last year, and consider what the next 12 months have in store. Hello and welcome to the first IT Governance podcast of 2018. Happy new year. As it’s the first one, let’s have a brief recap of some of last year’s biggest stories, and then look ahead to what we can expect from the next 12 months. The three biggest infosec stories of 2017 were, arguably, the Yahoo data breach, the WannaCry ransomware outbreak and the Equifax data breach.

article thumbnail

Coming Up: NAGARA 2018 Winter Regional Forum

The Texas Record

Join us on Friday, January 26 in Georgetown, TX for the 2018 Winter Regional Forum hosted by the National Association of Government Archives and Records Administrators (NAGARA). Several TSLAC employees from our division as well as our archivists helped plan this exciting day of training sessions located in our own backyard. Themes for the program include: Electronic Records Management, Cyber security, Personally Identifiable Information, Risk assessment, and The Cloud.

article thumbnail

Preparing for a PCI audit

IT Governance

Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is demonstrated by an audit of the cardholder data environment (CDE). The type of audit depends on the compliance requirements of the payment brand and the level of the merchant/service provider as defined by that brand. Level 1 merchants must have an external audit performed by a Qualified Security Assessor (QSA) and submit a Report on Compliance (RoC) – also commonly known as a Level 1 on-site assessment – to their acqu

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Vendors Share Patch Updates on Spectre and Meltdown Mitigation Efforts

Threatpost

Intel, Amazon, ARM, Microsoft and others have shared patch updates to keep customers informed on their mitigation efforts to protect against the far reaching Spectre and Meltdown vulnerabilities impacting computers, servers and mobile devices worldwide. .

Cloud 49
article thumbnail

Vendors Rush to Issue Security Updates for Meltdown, Spectre Flaws

Dark Reading

Apple alone remains silent so far on potential impact to its products and its plans to address new side-channel attack vulnerabilities.

article thumbnail

GDPR could drive sweeping changes in how organizations manage information

Information Management Resources

A new study finds that nearly three in four organizations plan to incentivize employees to improve data hygiene and take accountability for compliance.

GDPR 54
article thumbnail

Uber's Biggest Mistake: It Wasn't Paying Ransom

Dark Reading

Rather than scrambling to deal with attacks after the fact, companies need to focus on improving detection capabilities with tools that help them work within data laws, not outside of them.

IT 44
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

eSecurity Planet

2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.

article thumbnail

Is a Good Offense the Best Defense Against Hackers?

Dark Reading

The proposed Active Cyber Defense Certainty (ACDC) Act has its pros and cons. But it's not the only option for protecting your company's digital assets.

IT 46
article thumbnail

A New Partner for eDiscovery Daily!: eDiscovery Trends

eDiscovery Daily

When we first started the eDiscovery Daily blog back in September 2010, it took a while for us to gain traction. In fact, we were happy when we had 100 views in a given day on the blog. Now we get several times that number daily. Even on a holiday like Christmas Day, we still considerably exceed those early blog view numbers. Back then, you could only view our blog from within our own site, but that’s not true anymore.

article thumbnail

Don't believe the hype: There are no good uses for blockchain

Information Management Resources

After 10 years of development, nobody has come up with a use for blockchain that has been widely adopted.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Internet of (Secure) Things Checklist

Dark Reading

Insecure devices put your company at jeopardy. Use this checklist to stay safer.

article thumbnail

AMD limps Into 2018 as chipmaker goes from first place to last

Information Management Resources

The firm was one of only four companies in the 30-member semiconductor index to lose value in 2017.

52
article thumbnail

DHS Discovers Privacy Incident Involving Former Employee

Dark Reading

Former DHS OIG employee makes an unauthorized copy of PII data of DHS employees and parties involved in DHS OIG investigations.

Privacy 40