Sat.Jul 06, 2019 - Fri.Jul 12, 2019

What Is the Best Cloud Storage? We Debunk the Myths to Find Out

OneHub

With so much chatter about safe data storage, you can find yourself with a lot of questions. Is cloud storage secure? How much does it cost? What is the best cloud storage provider? We took the time to comb through the most common cloud storage myths and set the truth free about all things cloud.

Demo 52

The first anniversary of the GDPR: How a risk-based approach can help you achieve GDPR compliance

Thales eSecurity

Since the General Data Protection Regulation (GDPR) took effect on May 25th last year, data protection has become a very hot topic.

GDPR 98

4 key elements to a successful data governance strategy

Information Management Resources

Ensuring leaders understand they are responsible for their organization’s data and managing that data is not the sole duty of IT staff can lead to a stronger data stewardship program. Data governance Data management Data strategy

FTC Reportedly Approves $5 Billion Facebook Fine

Data Breach Today

Settlement Stems From Cambridge Analytica Incident After a long privacy investigation, the U.S. Federal Trade Commission voted to levy a $5 billion fine against Facebook, according to the Washington Post and the Wall Street Journal

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Who’s Behind the GandCrab Ransomware?

Krebs on Security

The crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were terminating the program after allegedly having earned more than $2 billion in extortion payouts from victims.

More Trending

Most databases will have moved to the cloud by 2022, says Gartner

Information Management Resources

By 2022, 75 percent of all databases will be deployed or migrated to a cloud platform, with only 5 percent ever considered for repatriation to on-premises, the research firm says. Cloud computing Database management Data management

Cloud 124

Moving From Vulnerability Management to Vulnerability Response

Data Breach Today

Syra Arif of ServiceNow on Essential Steps Shifting from vulnerability management to vulnerability response is becoming increasingly important, says Syra Arif of ServiceNow, who describes three essential steps

258
258

FEC: Campaigns Can Use Discounted Cybersecurity Services

Krebs on Security

The U.S. Federal Election Commission (FEC) said today political campaigns can accept discounted cybersecurity services from companies without running afoul of existing campaign finance laws, provided those companies already do the same for other non-political entities.

Agent Smith Android malware already infected 25 million devices

Security Affairs

‘Agent Smith’ is a new malware discovered by Check Point researchers that replaces legit Android Apps with malicious ones that infected 25 Million devices worldwide.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Pwned Passwords, Version 5

Troy Hunt

Almost 2 years ago to the day, I wrote about Passwords Evolved: Authentication Guidance for the Modern Era. This wasn't so much an original work on my behalf as it was a consolidation of advice from the likes of NIST, the NCSC and Microsoft about how we should be doing authentication today.

British Airways Faces Record-Setting $230 Million GDPR Fine

Data Breach Today

GDPR 251

Patch Tuesday Lowdown, July 2019 Edition

Krebs on Security

Microsoft today released software updates to plug almost 80 security holes in its Windows operating systems and related software.

Tips 172

Kali Linux is now available for Raspberry Pi 4

Security Affairs

The popular operating system Kali Linux is finally available for Raspberry Pi 4, this is great news for hackers and passionate. Offensive Security has announced the availability of the popular operating system Kali Linux for Raspberry Pi 4, this is great news for hackers and security experts.

IT 107

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

How should you investigate a data breach?

IT Governance

Digital Guardian recently asked a group of cyber security experts what the most important step is following a data breach. Several answered with some variation of ‘find out how it happened’.

MongoDB Database Exposed 188 Million Records: Researchers

Data Breach Today

Data Apparently Originated in a GitHub Repository Security researchers have found yet another unsecured database that left personal data exposed to the internet.

Data 244

Cell Networks Hacked by (Probable) Nation-State Attackers

Schneier on Security

Exclusive, experts at Yoroi-Cybaze ZLab released a free decryptor for Loocipher Ransomware

Security Affairs

Exclusive – Malware researchers at Yoroi-Cybaze ZLab have released a free decryptor tool for the Loocipher Ransomware. Ransomware continues to be an easy way to monetize the criminal efforts and for this reason new malware appear in the threat landscape.

Using Strategic Data Governance to Manage GDPR/CCPA Complexity

erwin

In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. News broke earlier this week of British Airways being fined 183 million pounds – or $228 million – by the U.K.

GDPR 100

Researchers Disclose Vulnerability in Siemens' ICS Software

Data Breach Today

Patch Issued in Light of Concerns Over Stuxnet-Like Attack Against Industrial Systems Researchers at the security firm Tenable uncovered a vulnerability in a Siemens software platform used to manage industrial control systems, and Siemens has issued a patch.

Inside a 'bug bounty' program to spot cybersecurity flaws

Information Management Resources

The PFM app provider Personal Capital set up a safe way for hackers to expose vulnerabilities in its software. Cyber security Security risk Network security Software development Personal Capital

Hackers compromised a Canonical GitHub account, Ubuntu source code was not impacted

Security Affairs

Yesterday, July 6, 2019, hackers breached the GitHub account of Canonical Ltd., the company behind the Ubuntu Linux distribution. On July 6, 2019, hackers have breached the GitHub account of Canonical Ltd., the organization behind the Ubuntu Linux distribution.

IT 108

An Amazon Phishing Scam Hits Just in Time For Prime Day

WIRED Threat Level

Some deals are too good to be true, even on the most made-up holiday of all. Security Security / Cyberattacks and Hacks

Apple Issues Silent Update to Remove Old Zoom Software

Data Breach Today

Rare Move Made to Protect Against Future Exploitation Apple has taken an extraordinary move to protect its users from a yet-to-be-disclosed vulnerability that could compromise Macs that have the Zoom video conferencing software installed.

Video 220

More than half of all data remains untagged and unclassified

Information Management Resources

A new study finds that companies have limited or no visibility over vast volumes of potentially business-critical data, creating a ripe target for hackers. Data types Data management Data discovery

Study 96

A new NAS Ransomware targets QNAP Devices

Security Affairs

Malware researchers at two security firms Intezer and Anomali have discovered a new piece of ransomware targeting Network Attached Storage (NAS) devices.

Introducing the largest coordinated release in OpenText history

OpenText Information Management

Today’s market-disrupting technologies are driving new and exciting opportunities to transform the way we live our personal lives, the way we do business, and the way we run our governments. The capacity for organizations to generate and collect information is greater than ever.

Marriott Faces $125 Million GDPR Fine Over Mega-Breach

Data Breach Today

Breach Persisted 4 Years - and Through Acquisition - Before Being Discovered Britain's privacy watchdog says it plans to fine hotel giant Marriott $125 million under GDPR for security failures tied to a 2014 breach of the guest reservation database for Starwood, which Marriott acquired in 2016.

GDPR 221

How to unlock enterprise-wide value from data and analytics

Information Management Resources

Organizations need to organize data and analytics teams to reflect their big-picture goals. Data management Analytics Data science

Hackers stole $32 million from Bitpoint cryptocurrency exchange

Security Affairs

BITPoint Japan-based cryptocurrency announced that hackers have stolen more than $32 million (3.5 billion yen) worth of cryptocurrency due to a cyber attack.

China Distributes Spyware at Its Border and Beyond

WIRED Threat Level

Plus, Cyber Command warns about Outlook bugs, Virginia criminalizes deepfake porn, and more top security news from this week. Security Security / Security News

IT 92

Leak Confirms Google Speakers Often Record Without Warning

Data Breach Today

The Cost of 'Smart Home AI Assistants': Humans Review Audio of What People Say George Orwell's "1984" posited a world in which Big Brother monitored us constantly via "telescreens." But thanks to our "smart" AI home assistants - from Google, Amazon and others - we're increasingly installing the monitoring equipment ourselves, and it may "hear" much more than we realize

IT 217