Thu.Feb 01, 2018

article thumbnail

US Data Breaches Hit All-Time High

Data Breach Today

Millions of Payment Cards and Social Security Numbers Exposed The number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described how bad their breach was - and one-third did not - collectively lost 14 million payment cards and 158 million Social Security numbers, according to the Identity Theft Resource Center.

article thumbnail

Who's Watching Your Operations?

AIIM

You manage a large facility with multiple buildings across the campus. Each building while somewhat unique, is equipped with plumbing, electrical, security, HVAC, and other elements that must be monitored, maintained and repaired at some point. Ideally, you would have an army of staff available to monitor and check everything constantly to provide feedback and predict what will happen before catastrophe strikes, but you don’t.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercrime as a Service: Tools + Knowledge = Profit

Data Breach Today

On cybercrime forums and darknet marketplaces, there's an abundant supply of cybercrime products and services and lots of demand, plus prices remain low, says Flashpoint's Liv Rowley. All that's needed to leverage the products and services to make a profit, she says, is a bit of knowledge.

178
178
article thumbnail

How ECM solutions are keeping pace with a new generation

OpenText Information Management

The way we work—the way we access, use, share and collaborate on business content—is undergoing a massive transformation. Workers today are more mobile. Projects demand greater collaboration, often across multiple sites and time zones. What’s more, the rise in consumer file sharing services has changed the way users interact with enterprise software, with vastly more … The post How ECM solutions are keeping pace with a new generation appeared first on OpenText Blogs.

ECM 90
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

$3.5 Million Penalty for Five Small 2012 Breaches

Data Breach Today

Fresenius Medical Care North America Agrees to HIPAA Settlement In one of the largest HIPAA settlements ever, federal regulators have signed a $3.5 million settlement with a Massachusetts-based healthcare organization that reported five small health data breaches in 2012 involving lost or stolen unencrypted computing devices.

More Trending

article thumbnail

Matson Logistics transforms information exchange with OpenText B2B Managed Services

OpenText Information Management

When your core business is shipping and logistics, what do you do when you find yourself committing substantial resources to managing the complexities of EDI and B2B operations? For Matson Logistics, the solution was to turn to the B2B Integration experts at OpenText. Matson Logistics wanted to focus on their core competencies and move away … The post Matson Logistics transforms information exchange with OpenText B2B Managed Services appeared first on OpenText Blogs.

B2B 72
article thumbnail

Winter Olympic Cyberattacks Have Already Started—and May Not Be Over

WIRED Threat Level

Two state-sponsored hacking operations are plaguing Pyeongchang, with murky motivations and no clear endgame.

article thumbnail

Evolving identity management models for securing the connected supply chain

OpenText Information Management

Our connected world – everywhere we turn, whether you’re a consumer connecting your Fitbit to your iPhone or an IT Director connecting smart sensors to your inventory and ordering systems, we’re told that the world of Internet of Things (IoT) is the new world we live in. And it is: there are more connected devices, … The post Evolving identity management models for securing the connected supply chain appeared first on OpenText Blogs.

IoT 71
article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

This week, we discuss the Australian government’s loss of thousands of classified documents, DCMS Secretary of State Matt Hancock’s buggy new app and the growing trend of cybercriminals using cryptocurrency miners. Hello and welcome to the IT Governance podcast for Friday, 2 February 2018. Here are this week’s stories. Data breaches don’t just occur when cyber criminals hack your systems, and it’s as well to remember that sensitive information in all forms – including hard copy recor

Mining 62
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Jackpotting Attacks Against US ATMs

Schneier on Security

Brian Krebs is reporting sophisticated jackpotting attacks against US ATMs. The attacker gains physical access to the ATM, plants malware using specialized electronics, and then later returns and forces the machine to dispense all the cash it has inside. The Secret Service alert explains that the attackers typically use an endoscope -- a slender, flexible instrument traditionally used in medicine to give physicians a look inside the human body -- to locate the internal portion of the cash machin

article thumbnail

NIS Directive consultation feedback published – how to comply

IT Governance

In August 2017 the UK government issued a consultation document on compliance requirements for the upcoming Directive on security of network and information systems (NIS Directive). There were more than 350 responses to the consultation, and the government has now released the next steps for organisations that fall under the requirements of the Directive.

article thumbnail

Global: Data Privacy Snapshot 2018

DLA Piper Privacy Matters

Data protection is rising on the agenda globally: the past year has seen China introduce the PRC Cybersecurity Law, the introduction of Australia’s mandatory Privacy Amendment (Notifiable Data Breaches) Act 2017, while the EU’s long awaited General Data Protection Regulation is due to come in to force in May 2018. With this background, we are pleased to launch the DLA Piper Global Data Privacy Snapshot for 2018.

article thumbnail

Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises

Dark Reading

Attackers looking to hijack systems for illegally mining digital currencies have begun eyeing business systems, security vendors say.

Mining 59
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

My Blog Now Has a Content Security Policy - Here's How I've Done It

Troy Hunt

I've long been a proponent of Content Security Policies (CSPs). I've used them to fix mixed content warnings on this blog after Disqus made a little mistake , you'll see one adorning Have I Been Pwned (HIBP) and I even wrote a dedicated Pluralsight course on browser security headers. I'm a fan (which is why I also recently joined Report URI ), and if you're running a website, you should be too.

IT 47
article thumbnail

Adobe Flash Player Zero-Day Spotted in the Wild

Threatpost

A zero-day exploit targeting Adobe Flash Players has been reported by the South Korean Computer Emergency Response Team and confirmed by Adobe.

51
article thumbnail

Ramnit's Holiday Shopping Spree: Retailers & E-commerce

Dark Reading

This past season, the authors of a traditional banking Trojan focused on what people do between Thanksgiving and New Year's Day: shop, eat, check their bank account, and entertain.

Retail 43
article thumbnail

4 key elements to successful data governance

Information Management Resources

The sad reality is that most data holds no value, yet it consumes valuable time and resources. Organizations need better ways to assess the information they have, starting with these criteria.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Thinking about a Career Move in Cybersecurity?

Dark Reading

The numbers show career opportunities for cyber defenders.

article thumbnail

Epson Business Solutions Win Top Accolades from Keypoint Intelligence – Buyers Laboratory

Info Source

LONG BEACH, Calif. – Jan 30, 2017 – Epson, a leading provider of innovative business solutions, today announced Keypoint Intelligence – Buyers Lab (BLI) , the world’s leading independent evaluator of document imaging software, hardware, and services, has recognized Epson’s innovation for its business printing and scanning solutions. The WorkForce ® ET-16500 EcoTank ® All-in-One Printer received BLI’s Winter 2018 Pick for Outstanding Achievement Award in Value.

Paper 40
article thumbnail

HHS OCR issues cyber extortion newsletter

Data Protection Report

This week, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) published a January 2018 newsletter focusing on “cyber extortion.” Cyber extortion often involves an attacker gaining access to an organization’s computer system, stealing sensitive information, and threatening to publish the information. Healthcare and public health organizations are often the targets of these attacks, so affected data frequently includes protected health information, or PHI.

article thumbnail

'Ransomware' Added to Oxford English Dictionary

Dark Reading

The term is one of 1,100 new entries added to the Oxford English Dictionary this week.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Massive Smominru Cryptocurrency Botnet Rakes In Millions

Threatpost

Researchers say Smominru threat actors are in control of 500,000 node botnet and earning $8,500 daily mining for Monero cryptocurrency.

Mining 45
article thumbnail

Securing Cloud-Native Apps

Dark Reading

A useful approach for securing cloud-native platforms can be adapted for securing apps running on top of the platform as well.

Cloud 47
article thumbnail

Taking aim at the growing shortage of data security professionals

Information Management Resources

It is estimated that by next year there will be a labor gap of 2 million cybersecurity professionals. A new pilot program hopes to introduce more students to the opportunities available in the field.

article thumbnail

Poor Visibility, Weak Passwords Compromise Active Directory

Dark Reading

Security experts highlight the biggest problems they see putting Microsoft Active Directory at risk.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Crypto Miners May Be the ‘New Payload of Choice’ for Attackers

Threatpost

Crypto mining botnets provide a stealthy way to generate big bucks, without the downsides of ransomware.

Mining 48
article thumbnail

In the Market for an eDiscovery Solution? Check Out this Buyers Guide: eDiscovery Trends

eDiscovery Daily

If you’re a small to medium sized law firm and you have yet to “dip your toe” into the water of selecting an eDiscovery solution (or are unhappy with the one you have selected), a couple of legal technologists have created a terrific new 2018 eDiscovery Buyers Guide to provide education about the alternatives to help you select a solution that’s right for you.

article thumbnail

Adobe to Patch Flash Zero-Day Discovered in South Korean Attacks

Dark Reading

Critical use-after-free vulnerability being used in targeted attacks.

52