Thu.Mar 08, 2018

article thumbnail

Memcached DDoS Attacks: 95,000 Servers Vulnerable to Abuse

Data Breach Today

Massive 1.7 Tbps Reflection/Amplification Attack Exploits Open Memcached Servers More than 95,000 servers that run the open source Memcached utiltity appear to remain vulnerable to being abused to launch massive DDoS attacks, with one such attack reaching a record 1.7 terabits per second. Here's how organizations and IT administrators must respond.

IT 157
article thumbnail

Color-coded filing systems: Reduce downtime and increase ROI – Part 2

TAB OnRecord

Part 1 of this post showed you how color-coding works and whom it benefits. We also made the business case for color-coding by demonstrating how it leads to more efficient records retrieval, retention and disposition; improved decision-making; less operational down time; fewer lost opportunities; and minimized risk of legal sanctions. In this blog, we focus on how color-coding improves your records privacy and information security, as well as your space management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Partners HealthCare CISO on Bolstering Endpoint Security

Data Breach Today

Bolstering endpoint protection is a top security priority at Partners HealthCare this year, says Jigar Kadakia, CISO of the Boston-based integrated health system. What else is on the agenda?

Security 124
article thumbnail

How Dutch Police Took Over Hansa, a Top Dark Web Market

WIRED Threat Level

Dutch police detail for the first time how they secretly hijacked Hansa, Europe's most popular dark web market.

Marketing 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Securing Borderless Networks

Data Breach Today

In an age when every organization is essentially borderless, how do security leaders approach securing the borderless network? Paul Martini of iboss Cybersecurity offers insights and solutions.

Security 100

More Trending

article thumbnail

How to write a GDPR privacy notice – with documentation template example

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) compliance project is producing appropriate documentation, which includes a privacy notice. If you are just beginning your GDPR project, it is unlikely that you will be fully compliant by the time the Regulation is enforced on 25 May 2018. However, in our recent blog, GDPR priorities in the lead-up to May , we suggested that your organisation should prioritise creating a privacy notice, and display this to data subjects wherev

GDPR 76
article thumbnail

Ad-Blocker Ghostery Just Went Open Source—And Has a New Business Model

WIRED Threat Level

Ghostery, Edward Snowden’s preferred ad-blocker, details how a privacy tool can actually make money without being gross.

Privacy 84
article thumbnail

Singapore Joins the APEC CBPR and PRP Systems

Hunton Privacy

On March 6, 2018, Singapore’s Ministry of Communications and Information announced that Singapore has joined the APEC Cross-Border Privacy Rules (“CBPR”) and Privacy Recognition for Processors (“PRP”) systems. As we previously reported , Singapore submitted its intent to join both systems in July 2017. Singapore becomes the sixth APEC economy to join the CBPR system, joining the U.S., Mexico, Canada, Japan and South Korea, and the second APEC economy to join the PRP system, after the U.S.

Privacy 60
article thumbnail

How Guccifer 2.0 Got 'Punk'd' by a Security Researcher

Dark Reading

Security expert and former Illinois state senate candidate John Bambenek details his two months of online interaction with the 'unsupervised cutout' who shared with him more stolen DCCC documents.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CIPL Issues White Paper on GDPR Implementation in Respect of Children’s Data and Consent

Hunton Privacy

On March 6, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on GDPR Implementation in Respect of Children’s Data and Consent (the “White Paper”). The White Paper sets forth guidance and recommendations concerning the application of GDPR requirements to the processing of children’s personal data.

Paper 49
article thumbnail

Olympic Destroyer's 'False Flag' Changes the Game

Dark Reading

Kaspersky Lab researchers uncover evidence of how the attackers who targeted the Winter Olympic Games impersonated an infamous North Korea hacking team.

51
article thumbnail

As software development ranks advance, will they welcome more women?

Information Management Resources

With the celebration of March 8 as International Women's Day, Katie Tierney reflects on why there is such a large gender gap in the developer community and what that means for the future.

article thumbnail

New Fee Charging Structure to Fund the UK Information Commissioner’s Office

HL Chronicle of Data Protection

The UK Government has announced a new three-tier charging structure for data controllers to ensure the continued funding of the Information Commissioner’s Office (ICO) to come into effect on 25 May 2018 to coincide with the GDPR coming into force. Currently, organisations that are controllers of personal data are legally required to register details of their processing activities with the ICO and pay a notification fee of £35 or £500, unless they are exempt.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

16 top platforms for data science and machine learning

Information Management Resources

Alteryx, KNIME and SAS are among the top vendors in this space, according to a new Magic Quadrant report from Gartner.

article thumbnail

CIGslip Lets Attackers Bypass Microsoft Code Integrity Guard

Dark Reading

The new technique would enable attackers to inject malicious content into Microsoft Edge and other protected processes.

48
article thumbnail

Cisco Firepower NGIPS: IDPS Product Overview and Analysis

eSecurity Planet

We review Cisco's Next-Generation Intrusion Prevention System, which can defend small branch offices up to large enterprises against security breaches

article thumbnail

Putting the S in SDLC: Do You Know Where Your Data Is?

Dark Reading

Data represents the ultimate attack surface. Avoid major data breaches (and splashy headlines) by keeping track of where your data is.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Olympic Destroyer: A False Flag Confusion Bomb

Threatpost

Researchers say the case of Olympic Destroyer malware show how threat actors can manipulate “geopolitical agenda” with false flags.

article thumbnail

Gozi Trojan Using Dark Cloud Botnet in New Wave of Attacks

Dark Reading

Gozi IFSB banking Trojan has rolled out new code, a new botnet and a high level of customization in the latest wave of attacks.

Cloud 44
article thumbnail

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

The annual appearance of the dancing light bulb can only mean one thing – it’s time for another thought leader series! Over our nearly 7 1/2 years of our existence, eDiscovery Daily has published several thought leader interviews from various thought leaders throughout the eDiscovery community, including an annual series of interviews at Legaltech New York (LTNY).

article thumbnail

Lookout: Dark Caracal Points To APT Actors Moving To Mobile Targets

Threatpost

Lookout researchers discussed Dark Caracal's implications for APT actors in the mobile space and why its now a juicy target.

IT 43
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ironclad Navies: The USS Monitor and CSS Virginia during the Civil War

Unwritten Record

March 9 marks the famous meeting of the Civil War ironclad ships the USS Monitor and the CSS Virginia at Hampton Roads, Virginia. The Cartographic Branch holds numerous plans and maps relating to the Battle of Hampton Roads and to the Civil War ironclads and ships involved in the battle. This post highlights some of the records relating to this noted engagement.

article thumbnail

Yahoo Agrees to $80 Million Settlement with Investors

Dark Reading

Investors alleged that Yahoo intentionally misled them about its cybersecurity practices.

article thumbnail

Often underfunded and under staffed, half of firms suffer data breaches

Information Management Resources

Despite greater awareness of cyber threats to their systems and customer data, most firms aren't confident they have the resources needed to put up a proper defense.

article thumbnail

History of the US Army Security Agency

Schneier on Security

Interesting history of the US Army Security Agency in the early years of Cold War Germany.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

North Korea Threat Group Targeting Turkish Financial Orgs

Dark Reading

Hidden Cobra appears to be collecting information for a later strike, McAfee says.

48
article thumbnail

Looming GDPR puts renewed focus on Sarbanes-Oxley compliance

Information Management Resources

SOX is a perfect bridge protocol for organizations undergoing a General Data Protection Regulation compliance audit in preparation for the May 2018 deadline.

article thumbnail

McAfee Closes Acquisition of VPN Provider TunnelBear

Dark Reading

This marks McAfee's second acquisition since its spinoff from Intel last year.

IT 40