Mon.Mar 19, 2018

article thumbnail

Facebook Attempts to Explain Data Leak, Denies 'Breach'

Data Breach Today

Political Data-Mining Firm Reportedly Obtained 50 Million Users' Private Details Facebook is under fire after reports suggested data-mining firm Cambridge Analytica obtained private information for 50 million Facebook users. The social network contends that it didn't suffer a "breach," as the information was legally obtained but subsequently misused.

Mining 172
article thumbnail

Data Analytics and Human Heuristics: How to Avoid Making Poor Decisions

Bill Schmarzo - Dell EMC

The “hot hand,” a metaphor applied frequently to the game of basketball, is the idea that a basketball shooter, after making several consecutive shots, will experience a higher than normal success rate on his or her ensuing shots. I discussed the “hot hand” concept, and its flaw, at a TDWI (The Data Warehouse Institute) conference many years ago. Figure 1: “The Hot Hand in Basketball” by Thomas Gilovich, Robert Vallone and Amos Tversky.

Analytics 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DHS: Some GE Imaging Devices Are Vulnerable

Data Breach Today

Alert: Hackers Can Potentially Exploit Hardcoded and Default Credentials A recent alert from the Department of Homeland Security warning of vulnerabilities in certain medical imaging products from GE Healthcare is a reminder to other medical device makers and healthcare entities about the risks posed by hardcoded and default credentials.

Risk 138
article thumbnail

The Facebook breach makes it clear: data must be regulated

The Guardian Data Protection

Companies use our personal information to enrich themselves. Regulation of this practice is long overdue The Observer reported on Saturday that Cambridge Analytica acquired 50 million Facebook profiles from a researcher in 2014. This appears to have been among the most consequential data breaches in history, with an impact that may rival the breach of financial records from Equifax.

IT 107
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Path to Modern IAM

Data Breach Today

The technology and operating models for identity and access management have evolved with time, but the way many enterprises approach IAM has not. How can security leaders modernize their IAM strategy in this era of unprecedented complexity? Patrick Wardrop of IBM Security shares insights.

Access 113

More Trending

article thumbnail

Microsoft Offers Payouts for New Spectre, Meltdown Flaws

Data Breach Today

Bug Bounty Program Seeks to Avoid Further Speculative Execution Unpleasantness To help identify and mitigate the next generation of Spectre and Meltdown speculative execution flaws in CPUs, Microsoft and Intel are offering researchers up to $250,000 if they share their discoveries as part of a coordinated vulnerability disclosure program.

113
113
article thumbnail

Success Criteria for Managing Permanent Electronic Records

National Archives Records Express

I am pleased to announce the publication of the Criteria for Successfully Managing Permanent Electronic Records. The guidance supports the Managing Government Records Directive (M-12-18), which states “By December 31, 2019, all permanent electronic records in Federal agencies will be managed electronically to the fullest extent possible for eventual transfer and accessioning by NARA in an electronic format.”.

article thumbnail

Facebook's Privacy and Transparency Failings Are Still a Serious Problem

WIRED Threat Level

You give Facebook all of your data in exchange for using their service—an exchange that seems increasingly out of whack.

Privacy 105
article thumbnail

The Cambridge Analytica exposé shows the UK needs better data protection | Liam Byrne

The Guardian Data Protection

From the savagery in Salisbury to ‘dark social ads’, Russia’s hybrid warfare is here and needs a swift response. US law may have the answer The Observer’s remarkable exposé of Cambridge Analytica must now bring down the curtain on the permissive environment for online electoral sabotage. It’s time for new laws, starting with a new UK version of the Honest Ads Act proposed in Congress, so voters finally learn who is targeting them with what “news” – and who’s writing the cheques.

IT 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly discussion podcast: Security in the Digital World

IT Governance

This week’s extract is taken from Graham Day’s book Security in the Digital World. This must-have guide features simple explanations, examples and advice to help you become security-aware in a developing digital world. Discussion Podcast Episode 8 – Security in the Digital World, The Internet: “ When you use the Internet you are potentially creating a path for an attacker to get into your personal space.” Learn how to: Keep your information secure; Apply the necessary controls to your home

article thumbnail

Today at Think 2018: What you can’t miss Monday

IBM Big Data Hub

We’re live at Think 2018. If you’re joining us in Las Vegas, welcome to the biggest IBM event of the year. You’re about to experience a whirlwind of analytics keynotes, panels, demos, and more.

article thumbnail

5 ways to improve your information security

IT Governance

Organisations are always looking for ways to improve their security posture, but the process is often frustrating. As soon as they secure one weakness, cyber criminals find another one. But if you take a step back, you’ll notice that, as much as cyber criminals’ tactics evolve, they always follow the same essential method and exploit the same vulnerabilities.

article thumbnail

Think 2018: Our favorite highlights from Monday

IBM Big Data Hub

Think 2018 is the biggest IBM conference of the year covering all things tech. And, to be sure you don't miss a moment, here are highlights from Monday, March 19, the first day of the event.

65
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How charities can reduce the risk of cyber attacks

IT Governance

Charities might have fewer resources than the average for-profit organisation, but they still have an obligation to keep information secure. Anyone who signs up for a charity hands over their personal details, including their name, address and usually their payment card details. Charities also keep information on employees, the people they help, and present and future projects.

Risk 66
article thumbnail

Russian APT Compromised Cisco Router in Energy Sector Attacks

Dark Reading

DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

IT 59
article thumbnail

Brexit readiness: what can manufacturers do now?

OpenText Information Management

Business hates uncertainty (so do most people for that matter). It’s a particularly uncomfortable and uncertain time for the UK manufacturing industry in the face of Brexit ambiguity. Manufacturing, in particular, will be seriously affected, and UK trade associations have already warned the government that uncertainty is slowing investment and leading to lay-offs in the … The post Brexit readiness: what can manufacturers do now?

article thumbnail

Half of Cyberattacks in the Middle East Target Oil & Gas Sector: Siemens

Dark Reading

Nearly one-third of all cyberattacks worldwide are against operations technology (OT), or industrial networks, a new report by Siemens and The Ponemon Institute shows.

56
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A Mirai Botnet Postscript: Lessons Learned

Threatpost

Threatpost's Tom Spring sits down with Flashpoint and Akamai to discuss how the two companies worked together to address the 2016 Mirai DDoS attacks.

IoT 57
article thumbnail

CIPL Welcomes Nathalie Laneret as New Director of Privacy Policy

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP is pleased to announce that Nathalie Laneret will be joining CIPL as Director of Privacy Policy in May. She brings more than 20 years of experience in data protection policy both in-house and in private practice. She is admitted to the New York and Paris bars and has experience in both France and in the U.S. on data protection, IT and security matters, contracts, competition law, compliance issues and litigation.

Privacy 50
article thumbnail

New Method Proposed for Secure Government Access to Encrypted Data

Dark Reading

'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.

article thumbnail

Data Analytics and Human Heuristics: How to Avoid Making Poor Decisions

Bill Schmarzo - Dell EMC

The “hot hand,” a metaphor applied frequently to the game of basketball, is the idea that a basketball shooter, after making several consecutive shots, will experience a higher than normal success rate on his or her ensuing shots. I discussed the “hot hand” concept, and its flaw, at a TDWI (The Data Warehouse Institute) conference many years ago. Figure 1: “The Hot Hand in Basketball” by Thomas Gilovich, Robert Vallone and Amos Tversky.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Data Protection Officer's Guide to the GDPR Galaxy

Dark Reading

Impending deadline got you freaking out? These five tips might help you calm down, at least a little.

GDPR 59
article thumbnail

Day in the Life: Andrew Glass

The Texas Record

I knew when joining the RMA unit that there was the occasional workday at the State Records Center. (I read about it on this blog!) This was a feature not a bug for me. So, when Sarah put out a call for extra hands for a workday at the State Records Center, I jumped on the opportunity. The Records Center is a different animal than our usual downtown location.

article thumbnail

A2iA Announces New Versions of its Server-Based Recognition Engines, Powered by the Latest Techniques in Image Analysis and Data Extraction

Info Source

New York, New York and Paris, France, March 14, 2018 – A2iA (@A2iA), an award-winning developer of artificial intelligence and machine-learning based software for the worldwide data capture, document processing, and payment systems markets, today announced new versions of its core recognition engines for server-based workflows: a2ia TextReader, a2ia DocumentReader, a2ia FieldReader, a2ia CheckReader and a2ia XE.

article thumbnail

SEC Issues New Interpretive Guidance on Cybersecurity Disclosures

HL Chronicle of Data Protection

On February 21, the Securities and Exchange Commission (SEC) published interpretive guidance to assist public companies in preparing disclosures about cybersecurity risks and incidents. The Commission’s release follows shorter cybersecurity “disclosure guidance” issued in 2011 by the staff of the SEC’s Division of Corporation Finance. The new guidance was prompted by the agency’s concern over the increase in the risks and frequency of data breach incidents and other cyber-attacks affecting publi

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AMD Processor Flaws Real, But Limited

Dark Reading

A vulnerability report threatened falling skies over AMD processor vulnerabilities that are real but limited in impact.

47
article thumbnail

Researchers Show How Popular Text Editors Can Be Attacked Via Third-Party Plugins

Threatpost

Security risk in extensible text editors enable hackers to abuse plugins and escalate privileges.

Risk 48
article thumbnail

Microsoft Offers New Bug Bounties for Spectre, Meltdown-Type Flaws

Dark Reading

Microsoft is offering a short-term bug bounty program for speculative execution side-channel vulnerabilities and threats.

44