Fri.Jan 05, 2018

article thumbnail

DHS Says 246,000 Employees' Personal Details Were Exposed

Data Breach Today

13 Years of Witness Statements to DHS Office of Inspector General Also Exposed The U.S. Department of Homeland Security says nearly 250,000 federal employees' personal details were exposed in a 2014 breach of its Office of Inspector General's case management system. Witness testimony and an unknown number of nonemployees' personal details also were exposed.

Security 181
article thumbnail

Susan Sherrouse AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Susan Sherrouse Email susan.sherrouse@fluor.com. LinkedIn Profile [link]. Job Title Principal Project Information Manager. Company Fluor. Please provide one or two points that you will mention during your session.

ROT 80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attacks Will Be More Devastating and Widespread

Data Breach Today

An analysis of how unprepared businesses are to fight back against the continued problem of ransomware is featured in the latest edition of the ISMG Security Report. Also featured: outlooks for health data breaches and other cybersecurity trends in 2018.

article thumbnail

Counting down, Getting Ready: GDPR in a Multi-Cloud World

Thales Cloud Protection & Licensing

( Originally posted to CenturyLink’s blog on November 10 ). To help save time and money, a growing number of enterprises are storing sensitive customer data in the public cloud. Increasingly, they’re also leveraging multiple cloud providers. According to IDC, nearly 80% of IT organizations currently deploy multi-cloud or plan to implement multi-cloud environments within 12 months.

GDPR 91
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees.

Security 127

More Trending

article thumbnail

SMBs – digitize or miss your window of opportunity

OpenText Information Management

Did you know that over 50% of information exchanged between business partners still travels by fax, email, or phone? The other half is exchanged via structured, automated methods and is increasingly gaining ground. If 2018 predictions are correct, I believe we are now at an inflection point and the window of opportunity for small to medium-sized businesses (SMBs) … The post SMBs – digitize or miss your window of opportunity appeared first on OpenText Blogs.

B2B 78
article thumbnail

What Happens If Russia Attacks Undersea Internet Cables

WIRED Threat Level

The world’s internet infrastructure is vulnerable, but snipping a couple of lines is the least of your concerns.

Security 111
article thumbnail

Spectre and Meltdown Attacks Against Microprocessors

Schneier on Security

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. On Wednesday, researchers just announced a series of major security vulnerabilities in the microprocessors at the heart of the world's computers for the past 15-20 years.

Cloud 77
article thumbnail

Even Realistic Videogames like Call of Duty Won’t Help Us Win Wars

WIRED Threat Level

Opinion: Research shows that millennial cadets' digital skills don't help them on the virtual battlefield.

Security 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

50 Gorgeous Gallery Walls You'll Want to Try

Archive Document Data Storage

Gallery walls are a decor trend that seem to be able to stand the test of time and for good reason. Powerful, beautiful, and full of character, these commanding art displays are a great way to fill up a large empty wall at home, without having to pull out your paint brushes (and with plenty more personality to boot). To prove our point, we've rounded up 50 of the most glorious gallery walls we could find on the web.

76
article thumbnail

Insurance firm and two senior figures handed record data breach fines

The Guardian Data Protection

Fines totalling more than £150,000 handed down over use of private detectives to illegally obtain private banking records An insurance firm and two senior figures connected with the company have been given record fines for using private detectives to illegally obtain the private banking records of a businessman they were investigating. The fines, totalling more than £150,000, were described by an official watchdog as the highest ever imposed under the Data Protection Act for unlawfully acquiring

article thumbnail

How to achieve an effective risk assessment

IT Governance

A risk assessment is the process of identifying, analysing and evaluating risk. Carrying out a risk assessment is the only way to ensure that the cyber security controls chosen for your organisation are appropriate to the risks it may face. Without a risk assessment to inform your cyber security choices, you could be wasting time, effort and resources defending against events that are unlikely to occur or won’t have much impact on your organisation.

Risk 72
article thumbnail

New Book Coming in September: "Click Here to Kill Everybody"

Schneier on Security

My next book is still on track for a September 2018 publication. Norton is still the publisher. The title is now Click Here to Kill Everybody: Peril and Promise on a Hyperconnected Planet , which I generally refer to as CH2KE. The table of contents has changed since I last blogged about this, and it now looks like this: Introduction: Everything is Becoming a Computer Part 1: The Trends 1.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google Play Removes 22 Malicious ‘LightsOut’ Apps From Marketplace

Threatpost

Google removed 22 malicious adware apps ranging from flashlights, call recorders to wifi signal boosters that together were downloaded up to 7.5 million times from the Google Play marketplace.

article thumbnail

Detecting Adblocker Blockers

Schneier on Security

Interesting research on the prevalence of adblock blockers: " Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis ": Abstract : Millions of people use adblockers to remove intrusive and malicious ads as well as protect themselves against tracking and pervasive surveillance. Online publishers consider adblockers a major threat to the ad-powered "free" Web.

Paper 54
article thumbnail

LockPoS Malware Sneaks onto Kernel via new Injection Technique

Dark Reading

"Alarming evolution" of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.

56
article thumbnail

Weekly Update 68

Troy Hunt

It's 2018! All new year and already someone has gone and broken our computer things courtesy of the Meltdown and Spectre bugs. I only touch briefly on them in this week's update and I refer people to my Twitter timeline for good coverage I've shared. However, there's one resource which stands out above the others and it's this thread from Graham Sutherland.

IT 43
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Breach of India's Biometric Database Puts 1 Billion Users at Risk

Dark Reading

The Tribune reports that hackers gained access to users' names, addresses, phone numbers, and other PII.

Risk 0
article thumbnail

#FunFactFriday – January, How About Those Resolutions?

WIRED Threat Level

It's the first week of the New Year and we're checking in to see how your resolutions are going in addition to offering up some fun facts about this tradition. That's right, it's #FunFactFriday time! [Click below for more]. The post #FunFactFriday – January, How About Those Resolutions? appeared first on HMA Public Relations.

IT 0
article thumbnail

Luxexcel to 3D print optical prescription lenses for Vuzix AR headsets

Dark Reading

Luxexcel, a Dutch company that specializes in the production of 3D printed lenses, has announced a new partnership with augmented reality company Vuzix through which it will manufacture and supply 3D printed prescription lenses for the new Vuzix Blade AR headset.

article thumbnail

What personal health strategies can teach us about utility asset health (part 1)

CGI

What personal health strategies can teach us about utility asset health (part 1). Studies on corporate wellness programs have shown that companies that proactively focus on improving employee health and well-being see significant benefits including a reduction in lost work days and employee healthcare costs. One of the key drivers of success for wellness programs is the proactive nature of monitoring and managing lifestyle factors such as nutrition and fitness.

IoT 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Nightmare Before Christmas: Security Flaws Inside our Computers

Dark Reading

How an Intel design decision with no review by industry security consultants led to one of the biggest vulnerabilities in recent history.

article thumbnail

What personal health strategies can teach us about utility asset health (part 1)

CGI

What personal health strategies can teach us about utility asset health (part 1). harini.kottees…. Fri, 01/05/2018 - 12:42. Studies on corporate wellness programs have shown that companies that proactively focus on improving employee health and well-being see significant benefits including a reduction in lost work days and employee healthcare costs.

IoT 40
article thumbnail

New Adware Discovered in 22 Apps in Google Play

Dark Reading

The 'LightsOut' adware is found is flashlight and utility apps, which have been downloaded between 1.5 million to 7.5 million times.

48
article thumbnail

Privacy in 2018: Expect the Unexpected

WIRED Threat Level

Making predictions for the year ahead is possibly as desirable as unreliable. In a world of unlimited data and advanced science, it would be tempting to think that the future is already written. Algorithms and artificial intelligence will show us what lies ahead with immaculate accuracy. Or perhaps not. At least not yet. To say that the world is in turmoil is an understatement and the same is true of the world of privacy and data protection, which makes predicting the future particularly tricky.

Privacy 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Kopin Bringing Their OLED Microdisplays To VR/AR Headsets

Dark Reading

A long time ago, the machine you’re using to read this article would’ve been large enough to fill an entire room. Moore’s Law dictates that as time goes on, processing power increases and physical size decreases. Just as this applies to the smartphone in your hand or the PC on your desk, this also applies to Virtual Reality headsets and display technologies.

article thumbnail

The Golden Globes Red Carpet Show Will Be Livestreamed on Facebook

WIRED Threat Level

Last year was supposed to be a big year for Twitter TV. The social platform inked numerous deals--from business news video content like Cheddar and Bloomberg to sporting events like National Football League games--but one of the most compelling arguments was that there was prime opportunity for awards shows, pop culture's catnip, to tap into.

40
article thumbnail

10 Predictions for Machine Learning and AI in 2018

Rippleshot

As a fraud analytics firm that leverages machine learning technology to better predict and stop the spread of fraud from compromised card details, you could say we’re already pretty bullish about the future of machine learning/artificial intelligence (AI) and its ability to transform the world of fraud detection. Just ask our team of data scientists if you need more evidence.