Sat.Apr 28, 2018 - Fri.May 04, 2018

article thumbnail

Besieged Cambridge Analytica Shuts Down

Data Breach Today

Data Analysis Firm at Heart of Facebook Scandal Cambridge Analytica, the data analysis firm that reportedly received data on up to 87 million Facebook users without their consent, shut down on Wednesday. The company had worked on the 2016 campaign of U.S. President Donald Trump.

174
174
article thumbnail

The GDPR and the right to be forgotten

IT Governance

Something that’s drawn a lot of attention in the lead up to the General Data Protection Regulation (GDPR) compliance deadline is “the right to erasure”, also known as the “right to be forgotten”. The new data subject right allows, in certain circumstances, individuals to request that all information held about them is permanently erased. Although your organisation will not always have to comply with an erasure request, you must if: The personal data is no longer necessary for the purpose you ori

GDPR 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Records Center is not an Archives: Transfer Forms!

The Schedule

[Note: This was a forum post to the Records Management Section list on SAA’s site that got a little out of hand. Rather than clog everyone’s mailbox, I decided to post it here. The fact that I can add Futurama GIFs to posts here, and not on SAA Connect, had absolutely nothing to do with this decision (he said, unconvincingly.). For your reference, the original question:].

article thumbnail

5 things you need to know about CIR management

IT Governance

What does cyber incident response (CIR) management do? CIR management can help your organisation mitigate the risk of information security incidents and minimise losses. A proper incident response framework will allow you to prevent unauthorised access to data stores, identify attack vectors and breaches, prevent and isolate malware, remediate threats, control your risk and exposure during an incident, and minimise operational losses.

Risk 75
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tips for Implementing Foundational Controls

Data Breach Today

Tripwire's Tim Erlin on Ways to Prevent Breaches Improperly implemented foundational controls pave the way for many data breaches, says Tim Erlin of Tripwire, who offers tips on building a strong foundation.

More Trending

article thumbnail

Victoria threatens to pull out of facial recognition scheme citing fears of Dutton power grab

The Guardian Data Protection

Identity matching bill provides ‘significant scope’ for minister to expand powers, state warns Victoria has threatened to pull out of a state and federal government agreement for the home affairs department to run a facial recognition system because the bill expands Peter Dutton’s powers and allows access to information by the private sector and local governments.

article thumbnail

Is Automation Obtainable? It is in your Accounts Payable Department

AIIM

AP Automation is an obtainable goal in this century, in this decade, in this year! How, you may ask? If you can relate to this stat from recent AIIM research where 52% of respondents say their invoice processes take at least three days – some up to as many as 25 days – when using manual solutions for invoice data entry, validation, and approval using paper, you are a prime candidate.

IT 83
article thumbnail

Twitter: We Goofed; Change Your Password Now

Data Breach Today

Passwords Inadvertently Saved to Log in Plaintext Format; Twitter Blames Bug Twitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an internal log, potentially putting them at risk. Twitter has blamed a bug for the fault, and recommends all users change their passwords immediately.

Passwords 184
article thumbnail

GDPR compliance: Reasons to be cheerful

IBM Big Data Hub

When you hire a life coach, feelings can often be mixed. Someone is helping you on the way to improving yourself, but that path is one you have to walk, and it can be tough. Feelings can be much the same about the European Union’s General Data Protection Regulation (GDPR), which some organizations view as a burden. But can’t it make your business fitter and healthier?

GDPR 87
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

MPs threaten Mark Zuckerberg with summons over Facebook data

The Guardian Data Protection

Parliament may formally call CEO to face Cambridge Analytica questions next time he is in UK MPs have threatened to issue Mark Zuckerberg with a formal summons to appear in front of parliament when he next enters the UK, unless he voluntarily agrees to answer questions about the activities of his social network and the Cambridge Analytica scandal. Damian Collins, the chair of the parliamentary committee that is investigating online disinformation, said he was unhappy with the information the com

94
article thumbnail

New Rowhammer Attack Hijacks Android Smartphones Remotely

WIRED Threat Level

Dutch researchers have pushed the mind-bending Rowhammer hacking technique one more step towards a practical attack.

Security 109
article thumbnail

Hackers Target 3 Mexican Banks' Real-Time Transfers

Data Breach Today

Mexico's Central Bank Says No Client Money Lost, But Activates Contingency Plans Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.

IT 174
article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

101
101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EU: data-harvesting tech firms are 'sweatshops of connected world'

The Guardian Data Protection

Data protection supervisor lambasts companies’ deluge of ‘take it or leave it’ privacy emails ahead of GDPR The European data protection supervisor has hit out at social media and tech firms over the recent constant stream of privacy policy emails in the run up to GDPR, calling them them the “sweatshops of the connected world”. With the tough new General Data Protection Regulations coming into force on 25 May, companies around the world are being forced to notify their users to accept new privac

GDPR 80
article thumbnail

Nigerian Email Scammers Are More Effective Than Ever

WIRED Threat Level

By fine-tuning social engineering techniques and targeting small businesses, Nigerian scammers have kept well ahead of defenses.

Security 102
article thumbnail

Australian Bank Lost Data For 19.8 Million Accounts

Data Breach Today

Commonwealth Bank Says Risks From Loss Of Two Magnetic Tapes Are Low Commonwealth Bank has confirmed that two magnetic tapes containing transaction information for 19.8 million accounts went missing two years ago after mishandling by a subcontractor. A forensic investigation concluded the tapes were likely destroyed, and no fraudulent activity has been detected.

Risk 172
article thumbnail

Weekly discussion podcast #13: Security in the Digital World

IT Governance

This week’s extract is taken from Graham Day’s book Security in the Digital World. This must-have guide features simple explanations, examples and advice to help you become security-aware in a developing digital world. Discussion Podcast Episode 13 – Security in the Digital World, Parental Security: “Cyber bullying is a serious issue as the victims cannot seek security or protection in their own home.” Learn how to: Keep your information secure; Apply the necessary controls to your home ne

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cambridge Analytica closure – questions and answers

The Guardian Data Protection

Following the Facebook data crisis, the company has folded. But will the scandal now end? Which companies are closing down? Cambridge Analytica, the company at the heart of the data scandal which has engulfed Facebook, announced it was shutting down on Wednesday evening. Continue reading.

IT 80
article thumbnail

Cambridge Analytica Shuts Down Amid Ongoing Facebook Crisis

WIRED Threat Level

The troubled data firm, which improperly accessed the data of up to 87 million Facebook users, has ceased operations.

Access 106
article thumbnail

Cybercrime Se Habla Español: Inside the Underground

Data Breach Today

Flashpoint's Liv Rowley Traces Spanish Language Hacker Forums in Latin America Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.

160
160
article thumbnail

Cyber risk and resilience: A guide for the board and senior management

IT Governance

Each and every organisation is affected by cyber risk: Organisations that believe they can ignore ‘cyber’ and the benefits it has to offer will probably cease to exist , as others adopt faster, more economical, less human-resource-intensive solutions to provide the same or better solutions. Organisations that embrace the opportunities and benefits that ‘cyber’ offers will expose themselves to its inherent threats and vulnerabilities.

Risk 75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Commonwealth Bank admits it lost backup data for 20m accounts

The Guardian Data Protection

The bank, one of the Australia’s big four, assures customers the information has not been compromised Sign up to receive the top stories from Guardian Australia every morning The Commonwealth Bank is reportedly facing renewed investigations after admitting it lost backup data on tape for more than 15 years of customer statements in 2016, affecting almost 20 million accounts.

IT 76
article thumbnail

How to Change Your Twitter Password Right Now

WIRED Threat Level

On World Password Day, Twitter discloses a major gaffe that left user passwords potentially vulnerable.

Passwords 109
article thumbnail

Twitter Sold Data to Cambridge University Psychologist

Data Breach Today

Same Researcher, Aleksandr Kogan, Sold Facebook Data to Cambridge Analytica Twitter is now caught up in the Cambridge Analytica scandal: The social network sold public Twitter data to Aleksandr Kogan, the same person who sold Facebook data to Cambridge Analytica. Twitter says Kogan obtained no private information on users.

157
157
article thumbnail

Interviewed on RSAC TV

Andrew Hay

I had the pleasure of being interviewed by Eleanor Dallaway, Editor and Publisher – Infosecurity Magazine, on RSA Conference Television (RSAC TV) last week at the annual RSA Security Conference. In the interview, we spoke of what I had observed on the show floor, the state of the security industry, and I describe my perfect customer in information security.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

NHS staff aren’t border guards. We won’t police the ‘hostile environment’ | Tim Dudderidge

The Guardian Data Protection

NHS Digital is sharing confidential patient data with the Home Office. This betrays those we are committed to caring for NHS Digital, which collects confidential patient information, is sharing this personal data with the Home Office to support its immigration enforcement work. This can result in patients being detained and potentially deported. In the Doctors of the World (DOTW) UK London clinic , doctors, nurses and support workers provide medical care for people excluded from NHS services – i

article thumbnail

AI Can Help Cybersecurity—If It Can Fight Through the Hype

WIRED Threat Level

There are a ton of claims around AI and cybersecurity that don't quite add up. Here's what's really going on.

article thumbnail

NSA: The Silence of the Zero Days

Data Breach Today

US Defense Department Defenders Say Attackers Don't Need No Stinking Zero Days The head of the NSA's Cybersecurity Threat Operations Center says attackers haven't bothered targeting unclassified U.S. Defense Department networks with a zero-day exploit in 24 months. Instead, they attempt to exploit flaws within 24 hours of information of the vulnerability or exploit going public.