Sat.Jun 08, 2019 - Fri.Jun 14, 2019

Why Data Literacy Matters


Growing up in a multilingual country, I know firsthand how learning a second, third, or fourth language can help connect you to more people and experiences. For knowledge workers today, the ability to “speak” data, just as one might speak a new language, is an invaluable skill.

From architecture to code: A primer on how to get it right

Information Management Resources

Getting an architectural artifact translated into a practical system implementation has always been problematic, but it doesn’t have to be. Software professionals Software development Software architects Hardware and software

How To 101

Computers and Video Surveillance

Schneier on Security

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched a dozen different screens, scanning for something interesting.

Video 93

Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. This is fast becoming a profound new security challenge for all companies – one that can’t be pushed to a side burner. Related: The rise of ‘memory attacks’ I’m making this assertion as federal authorities have just commenced steps to remove and replace switching gear supplied, on the cheap, to smaller U.S. telecoms by Chinese tech giant Huawei. These are the carriers that provide Internet access to rural areas all across America.

More Trending

Radiohead Dropped 18 Hours of Unreleased Music to Screw Pirates

WIRED Threat Level

You can listen to the _OK Computer_–era tracks right here. Security Security / Cyberattacks and Hacks

Instagram Shows Kids' Contact Details in Plain Sight

Data Breach Today

Sharing Email Address, Phone Numbers May Be Risky, Experts Say Tens of thousands of minors on Instagram expose their email addresses and phone numbers, which child-safety and privacy experts say is worrisome.

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Security Affairs

Encrypted messaging service Telegram was hit by a major DDoS attack apparently originated from China, likely linked to the ongoing political unrest in Hong Kong.

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. The prevalence of them seemed to be really ramping up as was the impact they were having on those of us that found ourselves in them, myself included.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

The Next Big Privacy Hurdle? Teaching AI to Forget

WIRED Threat Level

Opinion: The inability to forget doesn’t only impact personal privacy—it could also lead to real problems for our global security. Security Security / Privacy Opinion

Unsecured Database Leaves 8.4 TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4 TB of email metadata.

Recently a large chunk of European mobile traffic was rerouted through China Telecom

Security Affairs

On June 6, for more than two hours China Telecom re-routed through its infrastructure a large chunk of European mobile traffic. In November security researchers Chris C.

Groups 113

The state of European cybersecurity and lessons to learn

Thales eSecurity

As one of our recent blogs discussed, we are entering a new era of business – one that will see wholesale digital transformation drive a digital-first approach by businesses globally.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Gain Certification Skills and Earn Digital badges at Enterprise World 19

OpenText Information Management

Now more than ever, technical certifications help launch and accelerate careers. In technology roles, advancing your career is about demonstrating the skills you bring to an organization and the value you can add, not simply how long you’ve been in the industry.

US Border License Plate and Traveler Photos Exposed

Data Breach Today

Hack Attack Victim May Be Contractor Perceptics; Stolen Data Spotted on Dark Web License plate and traveler photos collected at the U.S. border have been compromised after a federal government subcontractor was hacked.

Hunting the ICEFOG APT group after years of silence

Security Affairs

A security researcher found new evidence of activities conducted by the ICEFOG APT group, also tracked by the experts as Fucobha. Chi-en (Ashley) Shen, a senior security researcher at FireEye, collected evidence that demonstrates that China-linked APT group ICEFOG (aka Fucobha ) is still active.

Groups 111

Financial Fraud Drives Multi-Factor Authentication Market


Fighting the rise of payment fraud and cyber attacks has also fueled the growth of the fraud prevention, detection and risk mitigation markets. Among those trends is the multi-factor authentication market that continues to see new investments as financial fraud rises.

Digital Transformation Examples: Three Industries Dominating Digital Transformation


Digital transformation examples can be found almost anywhere, in almost any industry. Its past successes – and future potential – are well documented, chronicled in the billion-dollar valuations of the frontrunners in the practice.

Multiple Class Action Lawsuits Filed in AMCA Breach

Data Breach Today

Critical RCE affects older Diebold Nixdorf ATMs

Security Affairs

Automated teller machine vendor Diebold Nixdorf has released security updates to address a remote code execution vulnerability in older ATMs.

Hackers Stole a Border Agency Database of Traveler Photos

WIRED Threat Level

In compromising a Customs and Border Protection subcontractor, hackers make off with photos of travelers and license plates. Security Security / Cyberattacks and Hacks

OpenText Discovery Project Manager Spotlight: Michael LaBrie

OpenText Information Management

Throughout Michael LaBrie’s career he’s had the opportunity to work on all sorts of different projects: Mergers and acquisitions, joint-defense groups (JDG), multi-district litigations (MDL), international antitrust matters, and everything in between.

10 Highlights: Infosecurity Europe 2019 Keynotes

Data Breach Today

Maersk on NotPetya Cleanup, Troy Hunt on Kid-Perpetrated Data Breaches, and More Data breaches, incident response and complying with the burgeoning number of regulations that have an information security impact were among the top themes at this year's Infosecurity Europe conference in London.

Millions of Exim mail servers vulnerable to cyber attacks

Security Affairs

Millions of Exim mail servers are exposed to attacks due to a critical vulnerability that makes it possible for unauthenticated remote attackers to execute arbitrary commands. A critical vulnerability affects versions 4.87 to 4.91 of the Exim mail transfer agent (MTA) software.

Security skills gap remains huge, and incidents are growing as a result

Information Management Resources

The cyber security skills shortage is worsening for the third straight year and has affected nearly three quarters of organizations, according to a new study. Data security Cyber security Cyber attacks

Study 123

Cellebrite Now Says It Can Unlock Any iPhone for Cops

WIRED Threat Level

In a strangely public product announcement, the phone-cracking firm revealed a powerful new device. Security Security / Cyberattacks and Hacks

IT 84

Are You APT-Ready? The Role of Breach/Attack Simulation

Data Breach Today

Xenotime threat actor now is targeting Electric Utilities in US and APAC

Security Affairs

Experts at Dragos firm reported that Xenotime threat actor behind the 2017 Trisis/Triton malware attack is targeting electric utilities in the US and APAC. Xenotime threat actor is considered responsible for the 2017 Trisis/ Triton malware attack that hit oil and gas organizations.

Groups 101

What is data protection by design and default

IT Governance

If your organisation is subject to the GDPR (General Data Protection Regulation) , you’re probably aware of your requirement to “implement appropriate technical and organisational measures” to protect the personal data you hold.

A Top Voting-Machine Firm Is Finally Taking Security Seriously

WIRED Threat Level

The long-awaited shift from paperless ballots could make elections more secure. Security

Microsoft Warns of Large Spam Campaign Hitting Europe

Data Breach Today

Attackers Using Older Office Exploit Microsoft is warnings about a large-scale spamming campaign hitting several countries in Europe, with the attackers using an old Office exploit to send emails to victims that contain malware in RTF attachments