Tue.Nov 06, 2018

article thumbnail

Symantec Buys Javelin Networks and Appthority

Data Breach Today

Separately, Thoma Bravo Moves to Acquire Veracode Software From Broadcom Symantec has announced not one but two acquisitions of private cybersecurity firms: Javelin Networks and Appthority. Meanwhile, a private equity firm announced that it will acquire application security testing firm Veracode from Broadcom for $950 million in cash.

article thumbnail

[Podcast] The Intelligent Approach to SharePoint and Office 365

AIIM

How do you make SharePoint and Office 365 deliver value as an intelligent information management platform? That's what we sought to find out when we first contacted SharePoint expert, Rob Bogue. Rob basically eats, breathes, and sleeps SharePoint, so we knew he'd be the perfect one to work with. Over the following months, we worked with Rob to develop an online course designed to teach you about Implementing Intelligent Information Management on SharePoint and Office 365.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blockchain: The Good, the Bad and the Legal

Data Breach Today

Attorney John Salmon Assesses Cybersecurity Applications for Blockchain As organizations investigate public and private blockchains to secure transactions and facilitate peer-to-peer transactions, they must ensure they know who's responsible, what the system is doing, what the cybersecurity and legal risks are and who's managing it, says attorney John Salmon.

article thumbnail

What’s the difference between business continuity and disaster recovery?

IT Governance

Disasters happen, whether it’s a cyber attack, flood, power outage, road closure or any other type of disruption. And when it strikes, your organisation needs to be ready to implement its business continuity and disaster recovery plans. . You might have been taught that these are two names for the same thing (they are often used interchangeably), but there’s a big difference.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

State of the Authentication Landscape

Data Breach Today

As we approach 2019, is it realistic to think the end of our dependency on traditional user names and passwords is in sight? Shane Weeden, and authentication expert with IBM Security, discusses the future of authentication and why he's encouraged by the FIDO2 initiative.

More Trending

article thumbnail

Managing Third-Party Risk in the Age of Ransomware

Data Breach Today

As ransomware and other cyberattacks continues to proliferate, organizations must improve vendor risk management so they have a plan in place in case a business associate falls victim, says Mitch Parker, CISO of Indiana University Health System, who will speak at ISMG's Healthcare Security Summit in New York.

Risk 135
article thumbnail

Security of Solid-State-Drive Encryption

Schneier on Security

Interesting research: " Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) ": Abstract: We have analyzed the hardware full-disk encryption of several SSDs by reverse engineering their firmware. In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many hardware implementations have critical security weaknesses, for many models allowing for complete recovery of the data

article thumbnail

Make sure you trust your third-party vendor

Thales Cloud Protection & Licensing

Best Buy, Panera Bread, Target and Under Armour. What do each of these companies have in common? They each suffered a data breach at the hands of a third-party vendor. While the most common definition of a data breach is the unauthorized access, transition, reproduction, dissemination or sale of personal, confidential or privileged data, if data is mistakenly shared with an unauthorized user by an authorized user– that is also a breach.

article thumbnail

Why the CISSP Remains Relevant to Cybersecurity After 28 Years

Dark Reading

The venerable Certified Information Systems Security Professional certification has been around for a very long time -- and for good reason.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

IBM Watson will be used by NIST to assign CVSS scores to vulnerabilities

Security Affairs

The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to reported vulnerabilities. The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. A Common Vulnerability Scoring System (CVSS) score between 0.0 and 10.0 that is assigned to each flaw according to its severity.

article thumbnail

SFC Announces New Policy to Regulate Digital Assets

Data Matters

On November 1, 2018, following a rising tide of speculation, the Hong Kong regulator Securities and Futures Commission (SFC) announced a series of initiatives to regulate digital assets for the first time (and, apparently, without the need for any kind of legislative approval or backing). The initiatives, discussed below, take effect immediately. For purposes of the new regime, the SFC refers to “virtual assets” broadly defined to include initial coin offerings (ICOs), digital tokens (such as di

article thumbnail

Arron Banks' firm and Leave.?EU face £135k fine over data misuse

The Guardian Data Protection

Information commissioner’s report says fines levied for ‘serious breaches’ of data laws Brexit campaign group Leave.EU and the Eldon Insurance company, owned by Arron Banks, face fines totalling £135,000 over breaches of data laws, a report from the information commissioner, Elizabeth Denham, has confirmed. The report, released on the commissioner’s website, stated that Leave.EU and Eldon – trading as GoSkippy – were each being fined £60,000 for “serious breaches” of the law that governs electro

article thumbnail

How to build with IBM and MongoDB Enterprise Document Store

IBM Big Data Hub

The IBM-MongoDB partnership continues to go like gangbusters. Announced in June 2018, our first version of MongoDB Enterprise Advanced is now giving way to our second version.

75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Midterm Elections 2018: All the Hoaxes and Viral Misinformation

WIRED Threat Level

WIRED is looking out for the biggest stories, the most common hoaxes, and the likeliest sources of confusion as they emerge throughout the day.

article thumbnail

Get an IBM data science professional certificate on Coursera

IBM Big Data Hub

The swelling demand for data scientists coupled with the evident skills gap has implications for the global economy as well as the tech industry. What’s causing it, and what can be done to address it?

article thumbnail

Hidden Costs of IoT Vulnerabilities

Dark Reading

IoT devices have become part of our work and personal lives. Unfortunately, building security into these devices was largely an afterthought.

IoT 79
article thumbnail

4 steps to make business intelligence teams more relevant

Information Management Resources

To enable business intelligence teams to move up the value chain from providing commodity reports to business driving analytics, organizations should add these four components.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

HSBC: Security Breach Exposes Account, Transaction Data

Dark Reading

Unauthorized users accessed HSBC accounts between Oct. 4 and 14, the bank reports in a letter to customers.

article thumbnail

Facebook Blocks Handful of Accounts on Eve of Election

Adam Levin

Facebook announced in a blog post on November 5th that it blocked 115 accounts on its platforms after being informed by law enforcement that they may have been “engaged in coordinated inauthentic behavior.”. Roughly 30 of the Facebook accounts blocked were from Russian or French speakers, with the remaining 85 on its Instagram platform being in English.

IT 60
article thumbnail

Most Businesses to Add More Cloud Security Tools

Dark Reading

Cloud adoption drives organizations to spend in 2019 as they learn traditional security practices can't keep up.

Cloud 80
article thumbnail

HSBC Data Breach Hits Online Banking Customers

Threatpost

The data breach includes names, addresses, transaction histories, account information and more.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Midterm Elections 2018: Voting Machine Meltdowns Are Normal—That’s the Problem

WIRED Threat Level

Americans watched their voting technology break down right in front of their eyes—or on social media—Tuesday, but it's too soon to tell if the problems reached historic proportions.

IT 57
article thumbnail

Group-IB and CryptoIns introduce the world’s first insurance against cyber threats for cryptocurrency exchanges

Security Affairs

Group-IB and Swiss insurance broker ASPIS that owns CryptoIns project, have developed the world’s first scoring model for assessing cryptocurrency exchanges. Group-IB, an international company that specializes in preventing cyber attacks, and a Swiss insurance broker ASPIS SA that owns CryptoIns project, have developed the world’s first scoring model for assessing cryptocurrency exchanges cybersecurity, allowing the exchanges’ clients to ensure their assets.

article thumbnail

Collecting Information from the Web: Practical Business Uses and Who’s Doing It

Import.IO

Automating the process of collecting information from the web is a technique that allows companies – large and small – to extract unstructured content from a website or web page into a cleanly structured format. The data, once extracted, can be used in many kinds of business intelligence and decision-making scenarios. Data extraction or web […].

IT 53
article thumbnail

Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security

Dark Reading

Vulnerabilities in Samsung, Crucial storage devices enable data recovery without a password or decryption key, researchers reveal.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed

Threatpost

Firmware updates won't address the problem, so admins need to take other action.

article thumbnail

Black Hat Europe London: Learn How to Unearth Critical Vulnerabilities

Dark Reading

Black Hat's lineup of Arsenal tools, Briefings, and in-depth Trainings will equip you with the skills you need to protect today's modern devices and operating systems.

49
article thumbnail

Midterms 2018: The Unprecedented Effort to Secure Election Day

WIRED Threat Level

Ninety-four district election officers. Thirteen hundred electoral jurisdictions. Multiple law enforcement agencies. The fight to keep the midterms safe has an unimaginable scope.