Tue.Feb 06, 2018

article thumbnail

Apple, Cisco Strike Partnerships for Cyber Insurance

Data Breach Today

Policies Offer Incentives for Good Information Security Practices Apple and Cisco say they've partnered with insurers Aon and Allianz to offer cyber insurance policies for organizations that meet best security practices and use products from the technology companies. The partnership follows increasing interest in cyber insurance as a hedge against hacking risks.

Insurance 140
article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Charge Two ATM Jackpotting Malware Suspects

Data Breach Today

US Secret Service Alert: ATM Attackers Are Dressing Like Diebold Technicians The Department of Justice has charged two men, arrested in Connecticut near the scene of a jackpotting attack against a drive-up ATM, with bank fraud stemming from a malware attack. Police say they recovered $9,000 in $20 bills, as well a black box and other equipment from the suspects' car.

113
113
article thumbnail

How State Governments Can Protect and Win with Big Data, AI and Privacy

Bill Schmarzo - Dell EMC

I was recently asked to conduct a 2-hour workshop for the State of California Senior Legislators on the topic of “Big Data, Artificial Intelligence and Privacy.” Honored by the privilege of offering my perspective on these critical topics, I shared with my home-state legislators how significant opportunities await the state. I reviewed the once-in-a-generation opportunities awaiting the great State of California (“the State”), where decision makers could vastly improve their constituents’ qualit

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

British Hacking Suspect Avoids Extradition

Data Breach Today

Lauri Love Wins Appeal, But Faces Prosecution in England Lauri Love, a British man accused of 2012 and 2013 hack attacks against U.S. government computers - including systems operated by the Federal Reserve, U.S. Army and NASA - has won his legal bid to quash a U.S. extradition request. But he still faces a potential trial in England.

More Trending

article thumbnail

Apple, Cisco Strike Partnerships for Cyberinsurance

Data Breach Today

Policies Offer Incentives for Good Information Security Practices Apple and Cisco say they've partnered with insurers Aon and Allianz to offer cyber insurance policies for organizations that meet best security practices and use products from the technology companies. The partnership follows increasing interest in cyber insurance as a hedge against hacking risks.

Insurance 100
article thumbnail

Data discovery: the first step to GDPR compliance

OpenText Information Management

We’re now less than five months away from the required compliance date of the EU General Data Protection Regulation (GDPR). Organizations that have EU residents as customers, suppliers or partners are required to be in compliance by May 2018. For legislation that has received so much publicity, it’s surprising how unprepared many organizations are for … The post Data discovery: the first step to GDPR compliance appeared first on OpenText Blogs.

article thumbnail

AutoSploit: Mass Exploitation Just Got a Lot Easier

Dark Reading

But the response to the new hacking tool, now readily available to the masses of script kiddies, has been a mix of outrage, fear, some applause, and more than a few shrugs.

57
article thumbnail

What is Cryptojacking and Why Is It a Cybersecurity Risk?

eSecurity Planet

Learn about this emerging attack method and how it's impacting organizations around the world in this eSecurityPlanet series.

IT 64
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Poor Security at the UK National Health Service

Schneier on Security

The Guardian is reporting that "every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required.". This is the same NHS that was debilitated by WannaCry.

article thumbnail

Uber's Response to 2016 Data Breach Was 'Legally Reprehensible,' Lawmaker Says

Dark Reading

In Senate hearing, Uber CISO admits company messed up in not quickly disclosing breach that exposed data on 57 million people.

article thumbnail

Three trends that will help organizations modernize their data warehouse

Information Management Resources

The adoption of machine learning and the need for access to data beyond just data science team is changing how many firms approach information warehousing.

article thumbnail

Security vs. Speed: The Risk of Rushing to the Cloud

Dark Reading

Companies overlook critical security steps as they move to adopt the latest cloud applications and services.

Cloud 61
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How State Governments Can Protect and Win with Big Data, AI and Privacy

Bill Schmarzo - Dell EMC

I was recently asked to conduct a 2-hour workshop for the State of California Senior Legislators on the topic of “ Big Data , Artificial Intelligence and Privacy.” Honored by the privilege of offering my perspective on these critical topics, I shared with my home-state legislators how significant opportunities await the state. I reviewed the once-in-a-generation opportunities awaiting the great State of California (“the State”), where decision makers could vastly improve their constituents’ qual

article thumbnail

Identity Fraud Hits All-Time High in 2017

Dark Reading

Survey reports that the number of fraud victims topped 16 million consumers last year, and much of that crime has moved online.

51
article thumbnail

Why #Governance

Information is Currency

A governance program can benefit an organization because it does the following: Facilitates strategic planning and efficient decision-making. Builds a common understanding of the content and users’ technology. Provides a forum for users to advocate for their needs. Establishes clear user feedback and support channels. Grows understanding of required roles and responsibilities.

article thumbnail

2017 Smashed World's Records for Most Data Breaches, Exposed Information

Dark Reading

Five mega-breaches last year accounted for more than 72% of all data records exposed in 2017.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Leaky Amazon S3 Bucket Exposes Personal Data of 12,000 Social Media Influencers

Threatpost

Octoly's incident response was sorely lacking, says the Upguard researcher who found the exposed repository.

article thumbnail

Adobe Patches Flash Zero-Day Used in South Korean Attacks

Dark Reading

Critical flaw is one of two critical use-after-free vulnerabilities in Flash fixed today by the software firm.

46
article thumbnail

Cisco Issues New Patches for Critical Firewall Software Vulnerability

Threatpost

The vulnerability has a CVSS base score of 10.0, the highest possible, and now affects 15 products.

article thumbnail

Thoughts About Legaltech New York 2018: eDiscovery Trends

eDiscovery Daily

We’ve completed another LegalTech New York (LTNY) (a subset of “Legalweek”). What did attendees at the conference think about this year’s show? Let’s take a look. As I’ve done the past couple of years, I reached out to several attendees (some of whom I met with during the show) to get their thoughts and impressions of this year’s show. As always, these should be taken as their personal opinions and observations regarding the show, not those of their employer or clients.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

National Archives Does Not Tolerate Harassment

Archives Blogs

An article recently appeared in the media about allegations of serious sexual harassment by former Archivist of the United States Allen Weinstein. Weinstein served as the 9th Archivist of the United States from 2005 to 2008. Shortly after becoming the 10th Archivist of the United States in 2009, I learned of the allegations against Weinstein, and I was deeply disturbed by them.

article thumbnail

Ukraine Power Distro Plans $20 Million Cyber Defense System

Dark Reading

After NotPetya and severe blackouts, Ukrenergo responds with an investment in cybersecurity.

article thumbnail

Moving to cloud without security strategy increases data threat

Information Management Resources

A new study shows that the most common concerns are the risk of unauthorized access, the threat of malware infiltrations and the inability to monitor the activity of employees.

Cloud 31
article thumbnail

Microsoft Updates Payment, Criteria for Windows Bug Bounty

Dark Reading

The Windows Insider Preview Bounty Program will award between $500 and $15,000 for eligible submissions.

42
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Using the cyber attacks on other firms to drive defensive strategy

Information Management Resources

Vicarious experience is a robust tool for getting executive buy-in. Look at what competitors have experienced and use this to make convincing arguments.

article thumbnail

How Long is Long Enough? Minimum Password Lengths by the World's Top Sites

Troy Hunt

I've been giving a bunch of thought to passwords lately. Here we have this absolute cornerstone of security - a paradigm that every single person with an online account understands - yet we see fundamentally different approaches to how services handle them. Some have strict complexity rules. Some have low max lengths. Some won't let you paste a password.

article thumbnail

Using blockchain to solve IoT security challenges

Information Management Resources

In effect, the technology could be used to safely on-board Internet of Things and other connected devices, registering them in a private ledger.