Mon.Jun 18, 2018

article thumbnail

From identity provisioning to managing IoT ecosystems

OpenText Information Management

More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems that include people, applications, systems and things – both inside and outside the organization. This is an exciting new world. At its heart lies a new generation of identity management technologies and mindsets.

IoT 45
article thumbnail

Are You Disposing Hard Drives Safely?

Record Nations

When you delete files from your computer, they can still be recovered. That’s wonderful if you need to recover your own files. But if someone else gets a hold of files you intentionally deleted, it’s a whole different story. Destroying Data Someone may advise you to take a hammer, drill, or screw driver to the […]. The post Are You Disposing Hard Drives Safely?

IT 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Tips for Driving User Buy-in to Security Policies

Dark Reading

Teaching users why it's important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here's how.

article thumbnail

Google to Fix Location Data Leak in Google Home, Chromecast

Krebs on Security

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network. Craig Young , a researcher with security firm Tripwire , said he discovered an authentication weakness that leaks incredibly accurate location information about users of both

IoT 180
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

$4.3 Million HIPAA Penalty for 3 Breaches

Data Breach Today

MD Anderson Cancer Center Cited for Unencrypted Devices A lack of device encryption will cost a Texas-based cancer treatment center $4.3 million in civil monetary penalties from the Department of Health and Human Services.

More Trending

article thumbnail

Cybersecurity Insurance: How Underwriting Is Changing

Data Breach Today

Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward more carefully scrutinizing the cybersecurity postures of their potential clients.

Insurance 145
article thumbnail

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS. If you’re planning on stealing USD$27.9 million worth of diamonds, then all you need is some chocolate and a smile.

Phishing 110
article thumbnail

'Rex Mundi' Hacker Extortion Group: Busted

Data Breach Today

Seven Gang Members Arrested in France, Eighth Busted in Thailand, Police Say Cyber extortion group Rex Mundi has been shut down following the arrest of seven suspects in France and a French national in Thailand, police say. Investigators began pursuing the group last year after it stole customer data from a British firm and demanded $770,000 to not publicly release it.

IT 140
article thumbnail

Cyber attacks hit a fifth of schools and colleges

IT Governance

One in five schools and colleges have fallen victim to cyber crime, according to research from the specialist insurer Ecclesiastical, yet the majority (74%) of educational establishments claim to be “fully prepared” to deal with such attacks. . This discrepancy between perceived preparedness and reality is particularly alarming when you consider the sensitivity of the data held within the schools relating to pupils, parents and staff that could be compromised thanks to the careless actions of u

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Buzzword Bingo: Quantum, AI, Blockchain, Crypto

Data Breach Today

Thales e-Security's Jon Geater Separates Hype From Utility Quantum computing, blockchain, crypto, internet of things: There's a lot of hype around these technology areas, says Jon Geater, CTO of Thales e-Security. So it's essential to pierce the hype and see what's useful and applicable for practitioners.

article thumbnail

Apple's Latest iOS 12 Feature Will Save Lives by Pushing Your Location to 911

WIRED Threat Level

Forget memoji. Apple's push to transmit instant, accurate locations during emergency calls will have a profound effect for first responders.

article thumbnail

Incident Response Challenge: Knowing What to Prioritize

Data Breach Today

IBM's Mike Spradbery on Triage, Machine Learning, Tennis Incident response challenge: How to deliver actionable information to security analysts to enable them to better triage? "The quicker you can detect and respond to an incident, the more you're likely to be able to contain and minimize the risk associate with it," says IBM's Mike Spradbery.

Risk 100
article thumbnail

'Wallchart' Phishing Campaign Exploits World Cup Watchers

Dark Reading

The details on a phishing attack designed to lure soccer fans with a subject line about the World Cup schedule and scoresheet.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Data Breach Trends: Attackers' Dwell Time Deceases, Mostly

Data Breach Today

But Some EMEA Organizations Weren't So Lucky, Says Mandiant's Mike Trevett There's data breach good news and bad news for organizations in Europe, the Middle East and Africa, says Mike Trevett of FireEye's Mandiant. In general, attackers are dwelling in networks for less time before being discovered, except for some particularly long-lasting breaches in EMEA.

article thumbnail

Ridiculously Insecure Smart Lock

Schneier on Security

Tapplock sells an "unbreakable" Internet-connected lock that you can open with your fingerprint. It turns out that : The lock broadcasts its Bluetooth MAC address in the clear, and you can calculate the unlock key from it. Any Tapplock account an unlock every lock. You can open the lock with a screwdriver. Regarding the third flaw, the manufacturer has responded that ".the lock is invincible to the people who do not have a screwdriver.".

article thumbnail

Real-time business value comes from real-time data

IBM Big Data Hub

Data is business. The pace at which an organization can process data improves its ability to react to business events in real time.

IT 76
article thumbnail

Fake Video Could End Viral Justice

WIRED Threat Level

Opinion: Videos provide transformative new avenues for justice, often summoning well-deserved Twitter mobs. Deep fakes could change all that.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Teaming on data: IBM and Hortonworks broaden relationship

IBM Big Data Hub

Data is driving business. And as volumes climb with no end in sight, companies have a decision to make: harness and extract insight from that data, or watch your competitors do it as they pass you by.

IT 63
article thumbnail

How to create documentation to comply with the DSP Toolkit

IT Governance

The Data Security and Protection (DSP) Toolkit has superseded the Information Governance (IG) Toolkit as the standard for cyber and data security for healthcare organisations. The deadline for completing the DSP Toolkit is 31 March 2019, although larger organisations are requested to complete their submissions by October 2018. A quick overview of DSP Toolkit documentation.

GDPR 60
article thumbnail

Chicago Introduces Data Protection Ordinance

Hunton Privacy

Recently, the Personal Data Collection and Protection Ordinance (“the Ordinance”) was introduced to the Chicago City Council. The Ordinance would require businesses to (1) obtain prior opt-in consent from Chicago residents to use, disclose or sell their personal information, (2) notify affected Chicago residents and the City of Chicago in the event of a data breach, (3) register with the City of Chicago if they qualify as “data brokers,” (4) provide specific notification to mobile device users f

Retail 55
article thumbnail

How to know when data is 'right' for its purpose

Information Management Resources

The key to evaluating the accuracy of data is more about understanding the eventual use of it than any arbitrary or independent measure.

IT 57
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Home, Chromecast Leak Location Information

Threatpost

The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices.

article thumbnail

Google is training machines to predict when a patient will die

Information Management Resources

Software in health care is largely coded by hand these days. In contrast, Google’s approach, where machines learn to parse data on their own, 'can just leapfrog everything else.'.

article thumbnail

22K Open, Vulnerable Containers Found Exposed on the Net

Threatpost

Attackers can remotely access the infrastructure to install, remove or encrypt any application that the affected companies are running in the cloud.

article thumbnail

Sophos XG vs SonicWall NSA: Top NGFWs Compared

eSecurity Planet

A look at the strengths and weaknesses of Sophos XG and SonicWall NSA, two top next-generation firewalls.

57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

macOS QuickLook Feature Leaks Data Despite Encrypted Drive

Threatpost

Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature.

article thumbnail

Exposed Container Orchestration Systems Putting Many Orgs at Risk

Dark Reading

More than 22,600 open container orchestration and API management systems discovered on the Internet.

Risk 56
article thumbnail

California Ballot Initiative to Establish Disclosure and Opt-Out Requirements for Consumers? Personal Information

Hunton Privacy

On November 6, 2018, California voters will consider a ballot initiative called the California Consumer Privacy Act (“the Act”). The Act is designed to give California residents ( i.e. , “consumers”) the right to request from businesses (see “Applicability” below) the categories of personal information the business has sold or disclosed to third parties, with some exceptions.

Sales 40