Sat.Jun 08, 2019 - Fri.Jun 14, 2019

article thumbnail

Why Data Literacy Matters

Collibra

Growing up in a multilingual country, I know firsthand how learning a second, third, or fourth language can help connect you to more people and experiences. For knowledge workers today, the ability to “speak” data, just as one might speak a new language, is an invaluable skill. In the past, only a small group of data scientists and technologists worked closely with data, but now every team from sales to marketing to product design is data-driven.

article thumbnail

From architecture to code: A primer on how to get it right

Information Management Resources

Getting an architectural artifact translated into a practical system implementation has always been problematic, but it doesn’t have to be.

IT 43
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Computers and Video Surveillance

Schneier on Security

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched a dozen different screens, scanning for something interesting. In either case, the video was only stored for a few days because storage was expensive. Increasingly, none of that is true. Recent developments in video analytics -- fueled by artificial intelligence techniques like machine learning -- enable computers to watch and understan

article thumbnail

Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata. While it's not clear if anyone accessed the data, an attacker could have seen all email being sent or received by a specific person.

Metadata 276
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. This is fast becoming a profound new security challenge for all companies – one that can’t be pushed to a side burner. Related: The rise of ‘memory attacks’ I’m making this assertion as federal authorities have just commenced steps to remove and replace switching gear supplied, on the cheap, to smaller U.S. telecoms by Chinese tech giant Huawei.

More Trending

article thumbnail

Digital Transformation Examples: Three Industries Dominating Digital Transformation

erwin

Digital transformation examples can be found almost anywhere, in almost any industry. Its past successes – and future potential – are well documented, chronicled in the billion-dollar valuations of the frontrunners in the practice. Amazon began as a disruptor to brick-and-mortar bookstores, eventually becoming one of the most obvious digital transformation examples as it went on to revolutionize online shopping.

article thumbnail

Instagram Shows Kids' Contact Details in Plain Sight

Data Breach Today

Sharing Email Address, Phone Numbers May Be Risky, Experts Say Tens of thousands of minors on Instagram expose their email addresses and phone numbers, which child-safety and privacy experts say is worrisome. The kids have turned their profiles from personal ones to business ones, which Instagram mandates must have contact details. But is that appropriate for a child?

Privacy 269
article thumbnail

The state of European cybersecurity and lessons to learn

Thales Cloud Protection & Licensing

As one of our recent blogs discussed, we are entering a new era of business – one that will see wholesale digital transformation drive a digital-first approach by businesses globally. And as our 2019 Thales Data Threat Report – Europe Edition recently revealed, many of these businesses become extremely vulnerable during digital transformation, with those in Europe being no different.

article thumbnail

Essential Tips to Scale Remote Work Productively

AIIM

Recently, you may have heard the phrase, “I am working remotely.” But, what exactly is remote work? Let’s start by explaining the term first. A remote worker is someone who works outside the office space. As technology has evolved, it has changed the way people work and created new opportunities to work outside the office walls. Remote working is also referred to as teleworking or telecommuting.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Recently a large chunk of European mobile traffic was rerouted through China Telecom

Security Affairs

On June 6, for more than two hours China Telecom re-routed through its infrastructure a large chunk of European mobile traffic. In November security researchers Chris C. Demchak and Yuval Shavitt published a paper that detailed how China Telecom has been misdirecting Internet traffic through China over the past years. The experts speculate that they were intentional BGP Hijacking attacks.

Paper 106
article thumbnail

Unsecured Database Leaves 8.4 TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4 TB of email metadata. While it's not clear if anyone accessed the data, an attacker could have seen all email being sent or received by a specific person.

Metadata 254
article thumbnail

CNIL Fines French Real Estate Service Provider for Data Security and Retention Failures

Hunton Privacy

On June 6, 2019, the French Data Protection Authority (the “CNIL”) announced that it levied a fine of €400,000 on SERGIC, a French real estate service provider, for failure to (1) implement appropriate security measures and (2) define data retention periods for the personal data of unsuccessful rental candidates. Background. SERGIC provides real estate services through its website, which allows rental candidates to download any supporting documentation that may be required for the allocation of

article thumbnail

7 Truths About BEC Scams

Dark Reading

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.

110
110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Security Affairs

Encrypted messaging service Telegram was hit by a major DDoS attack apparently originated from China, likely linked to the ongoing political unrest in Hong Kong. Telegram was used by protesters in Hong Kong to evade surveillance and coordinate their demonstrations against China that would allow extraditions from the country to the mainland. The country is facing the worst political crisis ùsince its 1997 handover from Britain to China.

article thumbnail

US Border License Plate and Traveler Photos Exposed

Data Breach Today

Hack Attack Victim May Be Contractor Perceptics; Stolen Data Spotted on Dark Web License plate and traveler photos collected at the U.S. border have been compromised after a federal government subcontractor was hacked. While Customs and Border Protection officials claim the image data hasn't been seen online, security experts say it's already available for download via a darknet site.

article thumbnail

Going all-in on AWS Cloud

Thales Cloud Protection & Licensing

Virtually every major enterprise is moving to a cloud or multi-cloud environment as part of their digital transformation. In fact, according to our 2019 Thales Data Threat Report-Global Edition , 71% of respondents are using sensitive data in the cloud. This sensitive data as well as workloads in the cloud must be protected for compliance and security purposes.

Cloud 92
article thumbnail

Better Cybersecurity Research Requires More Data Sharing

Dark Reading

Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

A security researcher found new evidence of activities conducted by the ICEFOG APT group, also tracked by the experts as Fucobha. Chi-en (Ashley) Shen, a senior security researcher at FireEye, collected evidence that demonstrates that China-linked APT group ICEFOG (aka Fucobha ) is still active. Slides from my talk presented today at @CONFidenceConf – Into the Fog – The Return of ICEFOG APT.

article thumbnail

Multiple Class Action Lawsuits Filed in AMCA Breach

Data Breach Today

More Than a Dozen Lawsuits in Several States re: Breach Impacting 20 Million Patients A flurry of class action lawsuits have already been filed by individuals alleging they have been injured by a data breach at American Medical Collection Agency, which impacted more than 20 million patients of at least three medical laboratory testing firms.

article thumbnail

What is data protection by design and default

IT Governance

If your organisation is subject to the GDPR (General Data Protection Regulation) , you’re probably aware of your requirement to “implement appropriate technical and organisational measures” to protect the personal data you hold. An essential principle of this is data protection by design and by default. This essentially means that you must consider privacy and information security risks at the outset of all projects that involve personal data.

GDPR 90
article thumbnail

Tomorrow's Cybersecurity Analyst Is Not Who You Think

Dark Reading

Organizations can't just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical RCE affects older Diebold Nixdorf ATMs

Security Affairs

Automated teller machine vendor Diebold Nixdorf has released security updates to address a remote code execution vulnerability in older ATMs. Diebold Nixdorf discovered a remote code execution vulnerability in older ATMs and is urging its customers in installing security updates it has released to address the flaw. The vulnerability affects older Opteva model ATMs , Diebold Nixdorf will start notifying the customers next week.

article thumbnail

Are You APT-Ready? The Role of Breach/Attack Simulation

Data Breach Today

Cymulate's Tim Ager Discusses Data Breach Prevention in the Age of Advanced Attacks With the volume of data breaches and cyberattacks continuing to rise, organizations are increasingly relying on breach and attack simulation tools to provide more consistent and automated defenses, says Cymulate's Tim Ager.

article thumbnail

The Highly Dangerous 'Triton' Hackers Have Probed the US Grid

WIRED Threat Level

The same hackers behind a potentially lethal 2017 oil refinery cyberattack are now sniffing at US electrical utility targets.

Security 105
article thumbnail

Sensory Overload: Filtering Out Cybersecurity's Noise

Dark Reading

No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Millions of Linux Servers Under Worm Attack Via Exim Flaw

Threatpost

Attackers are exploiting a Linux Exim critical flaw to execute remote commands, download crypto miners and sniff out other vulnerable servers.

article thumbnail

10 Highlights: Infosecurity Europe 2019 Keynotes

Data Breach Today

Maersk on NotPetya Cleanup, Troy Hunt on Kid-Perpetrated Data Breaches, and More Data breaches, incident response and complying with the burgeoning number of regulations that have an information security impact were among the top themes at this year's Infosecurity Europe conference in London. Here are 10 of the top takeaways from the conference's keynote sessions.

Cleanup 217
article thumbnail

Gain Certification Skills and Earn Digital badges at Enterprise World 19

OpenText Information Management

Now more than ever, technical certifications help launch and accelerate careers. In technology roles, advancing your career is about demonstrating the skills you bring to an organization and the value you can add, not simply how long you’ve been in the industry. Technical certifications are an industry recognized method of showing a level of knowledge … The post Gain Certification Skills and Earn Digital badges at Enterprise World 19 appeared first on OpenText Blogs.