Mon.Oct 14, 2019

article thumbnail

CCPA Amendments Signed; Draft Regulations Released

Data Breach Today

Officials Attempt to Clarify Complex California Law's Requirements Gov. Gavin Newsom has signed into law six amendments to the California Consumer Privacy Act as well as another bill updating the state's long-standing data breach law. Meanwhile, draft CCPA implementation regulations have been unveiled.

article thumbnail

Tik Tok, Tick Tock…Boom.

John Battelle's Searchblog

Something’s been bugging me about Tik Tok. I’ve almost downloaded it about a dozen times over the past few months. But I always stop short. I don’t have a ton of time ( here’s why ) so forgive me as I resort to some short form tricks here. To wit: China employs a breathtaking model of state-driven surveillance. The US employs a breathtaking model of capitalist surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thoma Bravo to Buy Sophos for $3.9 Billion

Data Breach Today

Sophos Board Will 'Unanimously Recommend' Deal to Shareholders Private-equity firm Thoma Bravo, which already has stakes in several cybersecurity companies, plans to buy U.K.-based security company Sophos in a $3.9 billion deal, the two companies announced Monday. The Sophos board will "unanimously recommend" the sale to shareholders, the company says.

Sales 179
article thumbnail

Factoring 2048-bit Numbers Using 20 Million Qubits

Schneier on Security

This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It's interesting work, but I don't want overstate the risk. We know from Shor's Algorithm that both factoring and discrete logs are easy to solve on a large, working quantum computer. Both of those are currently beyond our technological abilities.

Paper 88
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hepatitis Patients' Data Exposed

Data Breach Today

Report: Philadelphia Department of Public Health Exposed Data on Website The Philadelphia Department of Public Health inadvertently exposed on its website the records of thousands of hepatitis patients, according to a local news report. The incident points to the need for better staff training, one expert says.

IT 153

More Trending

article thumbnail

Imperva's Breach Post-Mortem: API Key Left Exposed

Data Breach Today

Imperva Says Key Was Stolen and Used to Take Critical Customer Database Cybersecurity vendor Imperva's breach post-mortem should serve as a warning to all those using cloud services: One mistake can turn into a calamity. The company accidently left an AWS API key exposed to the internet; the key was then stolen and used to steal a sensitive customer database.

Cloud 145
article thumbnail

#TransformYourWorld with brick-by-brick Digital Transformation

Micro Focus

There are few more unifying things in life than Lego. Whether your kids play with it, or you enjoyed it in your own childhood, everyone likes these plastic bricks (unless you stand on one). There’s brand synergy here, too. We are, of course, committed to bringing digital transformation to our customers’ hybrid IT infrastructures. Seriously. View Article.

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

Cybercrime gang behind the Emotet malware is targeting organization with external SOC with emails claiming to deliver a SOC “weekly report.”. Introduction. The group behind Emotet malware is getting smarter and smarter in the way the y deliver such a Malware. While the infection schema looks alike from years; the way the group tries to infect victims improves from day to day.

article thumbnail

Cyber Theft, Humint Helped China Cut Corners on Passenger Jet

Dark Reading

Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says.

IT 83
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Cloud Pak for Data is the right solution for our clients

IBM Big Data Hub

We recommend Cloud Pak for Data to our clients who are considering machine-learning based Data analytics to get best ROI out of the volumes of data they accumulated over the years.

Cloud 65
article thumbnail

The Connected Cybercrime Ecosystem & the Impact of the Capital One Breach

Dark Reading

A company's security battle is not between that company and a specific fraudster; rather, it's between the company and connected cybercriminal ecosystem.

article thumbnail

Driving new revenue streams through artificial intelligence and advanced analytics

CGI

Driving new revenue streams through artificial intelligence and advanced analytics. ravi.kumarv@cgi.com. Tue, 10/15/2019 - 01:47. For more than 50 years, banks have relied on computers and software to manage and secure their data, as well as protect their customers’ interests. We are now on the cusp of a major revolution—something that will be as big for banks as the internet was for retail businesses.

article thumbnail

Pitney Bowes Hit by Ransomware

Dark Reading

The attack does not appear to have endangered customer data, but it has had an impact on orders for supplies and postage refills.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Scripting basics for everyone

Jamf

This step-by-step guide, based on Bill Smith's popular Scripting 101 for Apple Admins webinar, is written specifically for beginners.

73
article thumbnail

Privacy advocates criticize Apple for sharing some users browsing data with Tencent

Security Affairs

New problems for Apple, most of its users likely ignore that the company is sharing iOS web browsing data o n some of them to Chinese giant Tencent. Most Apple users likely don’t know that the tech giant is sending iOS web browsing data on some of them to the Chinese giant Tencent. The news is worrying, starting from at least iOS 12.2, Apple has integrated the “Tencent Safe Browsing” to improve security of its users and protect them from fraudulent websites.

Privacy 62
article thumbnail

Scripting basics for everyone

Jamf

This step-by-step guide, based on Bill Smith's popular Scripting 101 for Apple Admins webinar, is written specifically for beginners.

73
article thumbnail

Apple Shares Some Browsing History with Chinese Company

Threatpost

The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tamper Protection Arrives for Microsoft Defender ATP

Dark Reading

The feature, designed to block unauthorized changes to security features, is now generally available.

article thumbnail

Webinar on the SAFETY Act, Security and Insurance

Hunton Privacy

Recent headlines underscore the security challenges faced by public-facing businesses. From physical threats to cyber attacks targeting a wide range of critical infrastructure, companies in diverse sectors, such as the financial, retail, entertainment, energy, transportation, real estate, communications and other areas, face a challenging landscape of risks and potential liabilities.

article thumbnail

When Using Cloud, Paranoia Can Pay Off

Dark Reading

Journalists are increasingly concerned about what cloud providers may access or share with governments - and companies should worry as well.

Cloud 65
article thumbnail

A secret weapon for effective workplace communication

DXC Technology

Enterprise success in the digital economy is dependent in large part on the ability of employees to collaborate and communicate effectively. Increasingly, this means using digital tools to work with colleagues, customers, and business partners located remotely. Likewise, professional success for modern enterprise workers relies not only on adaptability and a learning mindset, but on […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Sophos for Sale: Thoma Bravo Offers $3.9B

Dark Reading

Sophos' board of directors plans to unanimously recommend the offer to the company's shareholders.

Sales 77
article thumbnail

Heading toward a data bright future: key takeaways from the 8th CGI Central Market Debate

CGI

Heading toward a data bright future: key takeaways from the 8th CGI Central Market Debate. pooja.cs@cgi.com. Tue, 10/15/2019 - 01:08. Are there learnings for the utilities industry from an augmented reality game’s incredible 19-day time-to-market, or the possibility that flying taxis could become cheaper than owning a car? The 8th CGI Central Market Debate, attended by more than 50 global industry experts, influencers and executives from across Europe, raised many such thought-provoking question

article thumbnail

5 Dos and 4 Don’ts for Smart, Corporate-Approved Social Media Use

KnowBe4

Social media is more than just a big part of our personal lives — it’s unavoidable in today’s world. Whether businesses like it or not, social media use spills into employee work time. But when it comes to work and your professional life, there are just some things that shouldn’t be shared on social media. So, how do you know what you’re allowed to post and what’s definitely off-limits?

article thumbnail

California Governor signs all 5 CCPA amendments

Data Protection Report

On Friday, October 11, 2019, the California Governor signed all five of the California Consumer Privacy Act amendments that were awaiting his signature (AB 25, 874, 1146, 1355, and 1564) as well as an amendment to California’s data breach law (AB 1130). We had previously written about the impact on CCPA if all five amendments went into effect here.

Privacy 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Webinar Invitation – CCPA Draft Regulations: What You Need to Know

HL Chronicle of Data Protection

Tim Tobin. Melissa Bianchi. Mark Brennan. Bret Cohen. Scott Loughlin. Please join Hogan Lovells on October 17 for a discussion of the much-anticipated proposed California Consumer Privacy Act (CCPA) regulations released recently by the California Attorney General. While the proposed regulations may change, including based on public input, they provide valuable signals of how the California Attorney General may ultimately approach a wide array of CCPA requirements.

Privacy 40
article thumbnail

CILIP election results

CILIP

CILIP election results. CILIP Chair, Caroline Brazier has been re-elected to the Board for a second four year term and Dr Helen Workman, who is Director of Learning Resources at Oxford Brookes University, has also been elected unopposed to the CILIP Board. Paul Corney was the sole nomination for Vice-President so he will take up that role from 1 January 2020.

40
article thumbnail

Atlanta unveils new policy to improve compliance with open records law via The Atlanta Journal-Constitution

IG Guru

Eighteen months after the Atlanta Journal-Constitution and Channel 2 Action News filed a formal Attorney General complaint alleging repeated violations of the state’s open records law, the city of Atlanta has a formal policy instructing employees and officials on how to respond to public records request. The post Atlanta unveils new policy to improve compliance with open records law via The Atlanta Journal-Constitution appeared first on IG GURU.