Sat.Mar 31, 2018 - Fri.Apr 06, 2018

article thumbnail

Malaysia's Central Bank Blocks Attempted SWIFT Fraud

Data Breach Today

Following the Unauthorized Transfer Attempt, Philippines Alerts Its Banks Malaysia's central bank, Bank Negara Malaysia, says it detected and successfully blocked an attack that attempted to steal funds via fraudulent SWIFT interbank money-moving messages. The attack against BNM led the central bank of the Philippines to issue an alert to banks in that country.

IT 188
article thumbnail

A radical proposal to keep your personal data safe | Richard Stallman

The Guardian Data Protection

The surveillance imposed on us today is worse than in the Soviet Union. We need laws to stop this data being collected in the first place • Richard Stallman is president of the Free Software Foundation Journalists have been asking me whether the revulsion against the abuse of Facebook data could be a turning point for the campaign to recover privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Steps to Mapping, Testing, and Implementing a Process

AIIM

This is an overview of what is involved when it comes to documenting how to automate your processes. Of course, the devil’s in the details, and certainly, this is not the only way, but after listening to and learning from hundreds of our industry’s best consultants and analysts (the benefit of producing so many webinars – I listen to them all), I think this is one approach for you to consider.

article thumbnail

How modern RIM professionals are staying relevant – Part 3

TAB OnRecord

In parts one and two of this blog post we discussed the importance of records management professionals getting involved in the early stages of the information lifecycle, and the need to convey RIM principles in terms of business outcomes. The final segment of this three-part post covers the skills needed by RIM professionals to be [.] Read More. The post How modern RIM professionals are staying relevant – Part 3 appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Panera Bread Data Leak Persisted For Eight Months

Data Breach Today

Database of Customer Information Left Exposed via Unauthenticated API Endpoint Panera Bread is warning that information on 10,000 customers has been inadvertently exposed. The data leak, however, persisted despite the company being alerted to the problem eight months ago, and there are signs that the victim tally may be much higher.

184
184

More Trending

article thumbnail

Belgian Privacy Commission Issues Guidance on Data Protection Impact Assessments Under the GDPR

Data Matters

On 28 February 2018, the Belgian Commission for the Protection of Privacy (the “Privacy Commission”) published a recommendation setting out its approach to Data Protection Impact Assessments (“DPIAs”), and in doing so published a “White List” and a “Black List” of processing operations, pursuant to the General Data Protection Regulation (“GDPR”). Organisations subject to the GDPR are required to assess whether they need to undertake a DPIA when undertaking new processing operations.

GDPR 92
article thumbnail

Thales Executives Speak to Press about UK Cybersecurity Developments

Thales Cloud Protection & Licensing

Thales eSecurity’s CTO Jon Geater and Peter Carlisle , Thales eSecurity’s VP of Sales, EMEA, were recently featured in major news outlets espousing their opinions about internet-connected devices and the new Cyber Security Export Strategy. Geater, on new UK IoT security guidelines. Earlier this month, the UK government announced guidelines to make internet-connected devices safer.

article thumbnail

Saks, Lord & Taylor Suffer Payment Card Data Breach

Data Breach Today

5 Million Payment Cards Apparently Stolen by the Carbanak Gang, aka JokerStash Department store chains Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor have suffered a data breach that apparently exposed details on 5 million payment cards. Cybersecurity firm Gemini Advisory says the JokerStash syndicate - aka Carbanak gang - is selling the stolen card data.

article thumbnail

AggregateIQ: the obscure Canadian tech firm and the Brexit data riddle

The Guardian Data Protection

Documents released last week shed more light on the puzzle of the company’s links to Cambridge Analytica ‘Find Christopher Wylie.” That instruction – 13 months ago – came from the very first ex-Cambridge Analytica employee I met. He was unequivocal. Wylie would have answers to the two questions that were troubling me most. He could tell me about Facebook.

Marketing 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches

WIRED Threat Level

Fin7, also known as JokerStash, Carbanak, and other names, is one of the most successful criminal hacking groups in the world.

Security 108
article thumbnail

Why risk assessments are essential for GDPR compliance

IT Governance

Any organisation that’s required to comply with the EU General Data Protection Regulation (GDPR) needs to conduct regular risk assessments. This isn’t just because the Regulation says so; it’s because risk assessments are an essential part of cyber security, helping organisations address an array of problems that, if left unchecked, could cause havoc.

GDPR 81
article thumbnail

Facebook: 87M Accounts May Have Been Sent To Cambridge Analytica

Data Breach Today

Social Networking Giant Also Says Malicious Actors Scraped Public Profiles Facebook says up to 87 million people may have had their personal details transferred to voter-profiling firm Cambridge Analytica. The figure includes 17 million people in nine countries outside the U.S., potentially intensifying regulator scrutiny of the social networking site.

179
179
article thumbnail

Facebook refuses to promise GDPR-style privacy protection for US users

The Guardian Data Protection

Firm working on version of EU data protection law but Mark Zuckerberg stops short of confirming all changes will apply to US users Facebook is rolling out stronger privacy protections to users ahead of the introduction of Europe’s General Data Protection Regulation (GDPR), but Mark Zuckerberg will not promise all future changes will apply to the company’s American users.

GDPR 94
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A 200-Year-Old Idea Offers a New Way to Trace Stolen Bitcoins

WIRED Threat Level

Cambridge researchers point to an 1816 precedent that could fundamentally change how "dirty" Bitcoins are tracked.

Security 108
article thumbnail

BS 31111: the new cyber security standard explained

IT Governance

Last month, a new British Standard was launched. BS 31111 is suitable for organisations of any type and size, and provides essential guidance for executive management to manage their cyber risk and resilience. Best-practice framework to implement a cyber security regime. Cyber security is often managed solely by IT departments but, to be truly successful, risks need to be addressed by the wider organisation – particularly executive management, who have a key role to play.

article thumbnail

Breaches Tied to Chat Network Provider

Data Breach Today

Delta, Sears, Kmart and Best Buy Breaches All Stem From Hack of Same Vendor A spate of payment card breaches at some of the most recognized U.S. brands has been blamed on the hacking of India-based chat network provider [24]7.ai that led to the infiltration of online chat portals for Delta, Sears, Best Buy, Kmart and perhaps others.

177
177
article thumbnail

Our data is valuable. Here's how we can take that value back | Francesca Bria

The Guardian Data Protection

Silicon Valley’s surveillance capitalism isn’t working. But Barcelona shows that citizens’ data can generate public value Tech firms are emerging as new feudal lords. They control essential digital infrastructures – in this case, data and artificial intelligence – which are crucial for political and economic activity. But it doesn’t have to be that way.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DC's Stingray Mess Won't Get Cleaned Up

WIRED Threat Level

DHS this week confirmed that Washington, DC is littered with fake cell tower surveillance devices, but nothing will likely be done to fix it.

IT 90
article thumbnail

Upcoming webinar: Business Continuity Management: How to get started

IT Governance

Cyber attacks, natural disasters, power failures, industrial action and human error: these risks all have the potential to severely disrupt business operations and are often unpredictable. A growing body of legislation and the current cyber threat landscape has made organisations even more aware of the risks of cyber attacks, and the importance of being able to effectively respond to and recover from a business disruption.

Risk 74
article thumbnail

Guilty Pleas in Criminal Insider Breach Case

Data Breach Today

Paper Records Stolen From Hospital Storage Unit Insiders with access to paper records can pose a serious fraud threat, as recent guilty pleas in an Oklahoma healthcare case illustrate. Experts offer advice on addressing the insider threat.

Paper 145
article thumbnail

Facebook suspects 300,000 Australians had data shared with Cambridge Analytica

The Guardian Data Protection

Chief technology officer reveals 87 million users worldwide had data harvested Facebook has admitted that the data of more than 300,000 Australians might have been “improperly shared” with Cambridge Analytica. The social media giant’s chief technology officer, Mike Schroepfer, published a statement overnight which revealed the data of up to 87 million people across the globe had been shared with the analytics firm, 37 million more than previously reported.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Alabama Becomes Final State to Enact Data Breach Notification Law

Hunton Privacy

On March 28, 2018, Alabama became the final state in the U.S. to enact a data breach notification law. The Alabama Data Breach Notification Act of 2018 (S.B. 318) (“the Law”) goes into effect on May 1, 2018. Key Provisions of the Alabama Data Breach Notification Act of 2018: The law applies to “covered entities” and their “third-party agents.” “Covered entity” is defined as “a person, sole proprietorship, partnership, government entity, corporation, nonprofit, trust, estate, cooperative associat

article thumbnail

GDPR compliance for professional services firms: time to get on track

IT Governance

The General Data Protection Regulation (GDPR)’s compliance deadline is looming. Every organisation that processes personal data must be in compliance with the new law by 25 May or risk substantial regulatory fines from the Information Commissioner’s Office and legal action from aggrieved data subjects. If you haven’t already, your firm must start your compliance project straight away or risk being in non-compliance.

GDPR 75
article thumbnail

Art Coviello on Fraud and the 2018 State of Security

Data Breach Today

RSA's Ex-CEO Opens up on Cybercrime and Social Media Risks Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.

article thumbnail

EU official seeks 'clear game plan' on social media and elections

The Guardian Data Protection

British commissioner wants more transparency and limits on harvesting data for political ends A senior EU official has called for action against internet companies that harvest personal data, as Brussels prepares to move against those spreading “fake news” following the Cambridge Analytica revelations. Sir Julian King, the European commissioner for security, wants “a clear game plan” on how social media companies are allowed to operate during political campaigns to be ready for the 2019 European

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Facebook Messenger's 'Unsend' Feature Is What Happens When You Scramble

WIRED Threat Level

It's good that Facebook is addressing its many privacy woes, but reacting rather than planning leaves some fixes feeling half-baked.

Privacy 84
article thumbnail

MyFitnessPal data breach: 150 million app users affected

IT Governance

Last week it was confirmed that the personal details of approximately 150 million users of Under Armour’s MyFitnessPal app were compromised after criminal hackers acquired usernames, email addresses and hashed passwords. This is one of the biggest hacks in history and, although payment card data was not affected, app users are likely to be concerned.

article thumbnail

The 4 Pitfalls of Privileged Access Management

Data Breach Today

Bomgar's Sam Elliott on Overlooked Areas of Security Overlooked areas of security and defense include four pitfalls of privileged access management, says Sam Elliott of Bomgar, who offers insights on taking the right steps.

Access 125