Fri.Dec 29, 2017

article thumbnail

Cryptojacking Has Gotten Out of Control

WIRED Threat Level

The practice of using a website visitor's device to mine cryptocurrency has expanded—and evolved—at an alarming rate.

Mining 111
article thumbnail

4 tips for achieving better ISO 27001 audit results

IT Governance

An ISO 27001-compliant ISMS requires ongoing maintenance and review to meet the Standard’s requirements in clauses 8 and 9. The internal audit is an essential element of this process that must be carried out as described in clause 9.2 of ISO 27001, and should be conducted at planned intervals. Organisations looking to achieve compliance with ISO 27001 often view the internal audit as a perplexing prospect.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Most-read WIRED Security Stories of 2017

WIRED Threat Level

Numerous tales of hacking and breaches proves just how permeable the digital membrane can be.

article thumbnail

The One Content Trend Essential to a Marketing Strategy in 2018

eSecurity Planet

As we inch closer to the end of the year, all brands have their eyes on the evolving marketing trends for 2018. To prepare, teams often start by brainstorming answers. The post The One Content Trend Essential to a Marketing Strategy in 2018 appeared first on Kapost Content Marketing Blog.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

21st Century Oncology Faces $2.3M HIPAA Settlement Cost after Breach

Dark Reading

Company to pay US Department of Health and Human Services over potential HIPAA violations after patient medical data was stolen by cyberthieves.

53

More Trending

article thumbnail

Handi Life Sport explores use of 3D printing for producing boccia balls for paralympic athletes

Dark Reading

When you think of bocce or pétanque, it is hard not to think of groups of retired men, sipping on cool drinks and tossing balls in the shade of a park. It’s as though the casual sport is stuck in the past—in a good way, to be sure.

IT 42
article thumbnail

DDoS Attacks Increasingly Blended Multiple Attack Vectors in Q3 2017

eSecurity Planet

The overall number of attacks rose by 15.6 percent over the previous quarter.

45
article thumbnail

Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation

Dark Reading

Micro-segmentation is very achievable. While it can feel daunting, you can succeed by proactively being aware of and avoiding these roadblocks.

IT 44
article thumbnail

eBay Listing Gets Better With These Productive Listing Management Inputs

The Schedule

Managing listing in eBay for better visibility and productivity is difficult to an extent that sellers often need to launch fresh battle strategies every single day. This is not just with small sellers, but with large established store owners as well. It does not matter whether you sell in fixed price or in auction, there are a few listing basics that need to maintained at all times for the sake of keeping heads above extremely competitive waters.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

China Shuts Down 13,000 Websites for Breaking Internet Laws

Dark Reading

The government says its rules are to protect security and stability, but some say they are repressive.

article thumbnail

2018 Employment Market Forecast is Looking Good

eSecurity Planet

Good news for the employment market and recruiting industry moving into 2018 with employers in all US regions and industry sectors expected to increase staff. The manufacturing and construction industries in particular are experiencing a rejuvenation leading to a marked increase in job openings within those sectors. The overall unemployment rate is expected to continue to drop over the next two years.

article thumbnail

Friday Squid Blogging: Squid Populations Are Exploding

Schneier on Security

New research : "Global proliferation of cephalopods" Summary : Human activities have substantially changed the world's oceans in recent decades, altering marine food webs, habitats and biogeochemical processes. Cephalopods (squid, cuttlefish and octopuses) have a unique set of biological traits, including rapid growth, short lifespans and strong life-history plasticity, allowing them to adapt quickly to changing environmental conditions.

article thumbnail

Book Review – Platform Capitalism

Information Matters

Title: Platform Capitalism. Author: Nick Srnicek. Genre: Philosophy. Publisher: Polity. Release Date: January 17, 2017. Pages: 120. The central focus of the book is data and how it is captured, processed and monetized by platform owners such as Facebook, Google and Uber. Srnicek is critical of some of the approaches of these companies, particularly Uber, but offers a realistic and useful description of their business models and the challenges they face as their platforms mature and the basic dri

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Profile of Reality Winner

Schneier on Security

New York Magazine published an excellent profile of the single-document leaker Reality Winner.

46