Mon.Feb 26, 2018

article thumbnail

Darknet Vendors Sell Counterfeit TLS Certificates

Data Breach Today

Pro Tip: Change TLS Certificates Regularly For Better Data Security Certificate Authorities continue to be tricked into issuing bogus TLS certificates. A study by Recorded Future found that there are at least three underground vendors that can supply fraudulent TLS certificates, which pose serious risks to data security and privacy.

Privacy 183
article thumbnail

E-Mail Leaves an Evidence Trail

Schneier on Security

If you're going to commit an illegal act, it's best not to discuss it in e-mail. It's also best to Google tech instructions rather than asking someone else to do it: One new detail from the indictment, however, points to just how unsophisticated Manafort seems to have been. Here's the relevant passage from the indictment. I've bolded the most important bits: Manafort and Gates made numerous false and fraudulent representations to secure the loans.

Paper 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trusted Exchange Framework: What's Lacking?

Data Breach Today

HIMSS, CHIME, AMIA Make Recommendations on Security, Privacy Provisions Some healthcare industry stakeholders say the Trusted Exchange Framework that HHS proposes to promote secure, interoperable nationwide health data exchange, while a good starting point, lacks clarity on certain security and privacy issues.

Privacy 100
article thumbnail

Insights about the first three years of the Right To Be Forgotten requests at Google

Elie

The "Right To Be Forgotten" (RTBF) is the landmark European ruling that governs the delisting of personal information from search results. This ruling establishes a right to privacy, whereby individuals can request that search engines delist URLs from across the Internet that contain “inaccurate, inadequate, irrelevant or excessive” information surfaced by queries containing the name of the requester.

Privacy 107
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

'NanoCore RAT' Developer Gets 33-Month Prison Sentence

Data Breach Today

Arkansas Man Admits Developing, Selling Software Intended for Malicious Use Arkansas developer Taylor Huddleston has been sentenced to serve more than two years in prison for developing, marketing and selling two tools designed to be used maliciously - the NanoCore remote access Trojan and Net Seal license software.

More Trending

article thumbnail

Replay Sessions From Mixpanel and Others Have Recorded Passwords

WIRED Threat Level

Analytics services are unintentionally collecting a mass of passwords and other sensitive data, new research shows.

article thumbnail

Information is the digital equivalent of snow

OpenText Information Management

Up here in Canada, it is the tough part of winter where you are done with snow and being cold. It is also flu and cold season – which if you have school age kids like me – means that your house is a mess of tissues and a chorus of coughs and sneezes. All … The post Information is the digital equivalent of snow appeared first on OpenText Blogs.

IT 67
article thumbnail

7 Key Stats that Size Up the Cybercrime Deluge

Dark Reading

Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.

IoT 79
article thumbnail

ISO identification of medicinal products (IDMP)

OpenText Information Management

In a previous blog I looked at some of the EU regulations that are disrupting the Life Sciences sector. One area of change with truly global implications is the implementation of the ISO Identification of Medicinal Products (IDMP). The EU is the first region to adopt IDMP but the US, Japan and the rest of … The post ISO identification of medicinal products (IDMP) appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The future of work begins at Think

IBM Big Data Hub

Empowered and humbled: that’s the roller-coaster, sweet-and-sour ride I’m on when I attend Think. I’m empowered and emboldened to follow my dreams and push the boundaries of what’s possible. I’m humbled, realizing how far I have to go to push my own boundaries and myself.

60
article thumbnail

The NIS Directive – Free updated compliance guide

IT Governance

The Directive on Security of Network and Information Systems (NIS Directive) ((EU) 2016/1148) aims to achieve a high common level of network and information systems security across the European Union. IT Governance has prepared a free compliance guide based on the UK Government’s consultation process. NIS Directive Objectives. To improve national cyber security capabilities.

article thumbnail

20 Cyber Security Startups to Watch in 2018

eSecurity Planet

Here are 20 hot IT security startups addressing everything from IoT security and blockchain to artificial intelligence and machine learning.

article thumbnail

Adobe Flash Vulnerability Reappears in Malicious Word Files

Dark Reading

CVE-2018-4878, a Flash zero-day patched earlier this month, has resurfaced in another campaign as attackers capitalize on the bug.

49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Records Management Training – Upcoming Courses – March, April, May, 2018

National Archives Records Express

We offer a Certificate of Federal Records Management Training to individuals who successfully complete Knowledge Area courses 2-6 and pass exams associated with each course. Upon completion of the courses and exams, participants will receive a certificate signed by the Archivist of the United States. We also offer specialty and overview courses like Electronic Records Management (ERM) and Basic Records Operations (BRO), Vital Business Info (VBI), Sustainable Formats and Permanent Electronic Reco

article thumbnail

Threats from Mobile Ransomware & Banking Malware Are Growing

Dark Reading

The number of unique mobile malware samples increased sharply in 2017 compared to a year ago, according to Trend Micro.

article thumbnail

Revamp of ‘Pwned Passwords’ Boosts Privacy and Size of Database

Threatpost

Troy Hunt has expanded his Pwned Passwords tool with 80 million more passwords, to help users find if their passwords have been compromised.

article thumbnail

6 Cybersecurity Trends to Watch

Dark Reading

Expect more as the year goes on: more breaches, more IoT attacks, more fines.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Germany Finds that Facebook’s Privacy Settings and Terms of Service Violate Their Privacy Rules: Data Privacy Trends

eDiscovery Daily

One of the things that Tom O’Connor and I discussed in last week’s webcast about the upcoming Europe General Data Protection Regulation (GDPR) was how consent will be interpreted for use of data for its data subjects. Last month, a German court may have given an early indication of how consent will be enforced. In Legaltech News ( Facebook Foreshadowing: German Court Underscores Tech’s Uncertain GDPR Future , written by Rhys Dipshan, free subscription required), the author notes that after a th

Privacy 40
article thumbnail

Making a successful case for a unified governance program

Information Management Resources

Though it may seem daunting, the benefits of a UG program include increased business efficiency and insight, decreased long-term costs and significantly reduced risks in managing data.

article thumbnail

PhishMe Acquired, Rebranded as Cofense in $400M Deal

Dark Reading

Cofense is the new name for PhishMe, which was purchased by a private equity consortium.

42
article thumbnail

Three trends driving data analytics efforts

Information Management Resources

After years of hype over the potential of big data, reduced storage costs, the rise of artificial intelligence and the embracing of blockchain technologies may finally fuel a payoff.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned

Troy Hunt

tl;dr - a collection of nearly 3k alleged data breaches has appeared with a bunch of data already proven legitimate from previous incidents, but also tens of millions of addresses that haven't been seen in HIBP before. Those 80M records are now searchable, read on for the full story: There's an unknown numbers of data breaches floating around the web.

article thumbnail

20 top startups redefining their industries with AI

Information Management Resources

Artificial intelligence promises to disrupt many sectors and to provide major competitive advantage. The result is a flood of investments for leading players.

article thumbnail

Db2 for z/OS: DDF, zIIP Engines, and SMT2

Robert's Db2

SQL statements executed by way of the Db2 for z/OS distributed data facility (DDF) are not, of course, the only workload that uses zIIP MIPs, but in my experience this does tend to be the main driver of zIIP utilization in a z/OS system on which Db2 runs. I posted an entry to this blog, a few years ago, on the importance of avoiding zIIP engine contention.

IT 48
article thumbnail

Are banks too blasé about mobile security?

Information Management Resources

A quarter of banks say they’ve experienced a mobile security incident in the past year. Many still lack basic security protections on employees’ devices, according to a study that came out this week.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

NHPRC and Andrew W. Mellon Foundation Launch Digital Publishing Initiative

Archives Blogs

On February 14, we made a great match. Together with the Andrew W. Mellon Foundation and our own National Historical Publications and Records Commission, we announced the eight planning-grant recipients for our joint Digital Edition Publishing Cooperatives Program. These eight cooperatives will test out new ways of making historical records more readily accessible to scholars, students, and the American people.

article thumbnail

North Korean hackers are said to breach Sawiris' Orascom network

Information Management Resources

Kim Jong Un’s cyber warriors broke into dozens of desktop computers at the Egyptian giant owned by billionaire Naguib Sawiris, which ironically helped build North Korea’s communication networks,

article thumbnail

Qualcomm leaves price as final hurdle to Broadcom takeover

Information Management Resources

Shareholders are mulling not only the largest deal in tech history but also one of the most complex.

35