Sat.May 05, 2018 - Fri.May 11, 2018

article thumbnail

Who’s more of a threat – insiders or external threat actors?

Thales Cloud Protection & Licensing

In past years’ Thales Data Threat Reports, we asked IT security pros around the world separate questions about whom they believed were the riskiest internal threats and external threats. The results were useful but didn’t allow us to compare which category proved most worrisome. This year, we restructured the two separate questions into a single one, and that gave us some very interesting results about who worries these IT security professionals the most.

article thumbnail

It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?

Thales Cloud Protection & Licensing

Data is increasingly amassed and harnessed to accelerate organizational transformation in the new digital economy. But because databases can hold sensitive details, protecting them is imperative. Unprotected data at rest is an attractive target for cybercriminals, and in today’s ever more distributed environment, not a week goes by without hearing of a new data breach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facial Recognition Tech Is Creepy When It Works—And Creepier When It Doesn’t

WIRED Threat Level

It's a powerful tool, but recent incidents have shown that there's no winning with facial recognition.

IT 94
article thumbnail

5 Ways to Better Use Data in Security

Dark Reading

Use these five tips to get your security shop thinking more strategically about data.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

INDIA: Data Localization – is it disruptive?

DLA Piper Privacy Matters

Recently, India’s Central Bank, Reserve Bank of India (RBI) came out with a directive on April 6, 2018 related to “storage of payment system data”. This order makes it mandatory for all system providers (as well as their service providers/intermediaries/ third party vendors and other entities) to ensure that all data relating to payment systems operated by the provider are stored in a system only in India.

IT 40

More Trending

article thumbnail

Cambridge Analytica: how did it turn clicks into votes?

The Guardian Data Protection

Whistleblower Christopher Wylie explains the science behind Cambridge Analytica’s mission to transform surveys and Facebook data into a political messaging weapon • The six weeks that brought Cambridge Analytica down How do 87m records scraped from Facebook become an advertising campaign that could help swing an election? What does gathering that much data actually involve?

IT 111
article thumbnail

How to Keep Hackers Out of Your Facebook and Twitter Accounts

WIRED Threat Level

Scammers, pranksters, and bad actors all want to break into whatever social media accounts they can. Here's how to keep yours safe.

Security 106
article thumbnail

Reader Favorites May 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover the costs of imaging for DIY and outsourcing projects, how to design a quality RIM training program, and lessons on how to apply green practices to your RIM program. The real cost of imaging: DIY vs. outsourcing One of the biggest questions to answer before starting an imaging [.] Read More. The post Reader Favorites May 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Zero-Day Attack Exploits Windows via Malicious Word Doc

Data Breach Today

Microsoft Patches Flaw, Warns It Could Be Exploited via Websites, Malvertising Security alert: Microsoft has issued updates to fix 67 unique flaws in its products. One vulnerability in Windows VBScript engine is already being actively exploited in the wild via malicious Word documents and could also be employed for attacks via websites and malvertising, Microsoft warns.

Security 182
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK regulator orders Cambridge Analytica to release data on US voter

The Guardian Data Protection

In landmark cross-border decision, Information Commissioner’s Office gives company 30 days to comply with David Carroll’s request Cambridge Analytica has been ordered to hand over all the data and personal information it has on an American voter, including details of where it got the data and what it did with it, or face a criminal prosecution. The UK Information Commissioner’s Office (ICO) served the enforcement notice to the company on Friday in a landmark legal decision that opens the way for

IT 111
article thumbnail

Arizona Updates Data Breach Law

Data Matters

Changes to data breach notification laws continue to pop up across the country this Spring. The latest comes from a new law signed by Arizona Governor Doug Ducey that amends the state’s data breach standards. Although much of the Arizona law has remained the same, the new law updates a few key provisions, including the definition of personal information, the requirements for the content of the data breach notice, the timing of notice, and the capping of penalties. .

article thumbnail

Find the rotten insights dragging down your business

IBM Big Data Hub

Each insight is useful for only a limited amount of time, so organizations that don’t closely track their insights’ shelf lives may be making poor decisions because of outdated information. Learn how to fix this.

77
article thumbnail

Cryptocurrency Miners Exploit Widespread Drupal Flaw

Data Breach Today

Researcher: 400 Sites or More Fall Victim to Massive, Forced Monero Mining Operation A remote code execution vulnerability revealed in late March in the Drupal content management system is now being used on a large scale for mining the virtual currency monero, a researcher says. At least 400 websites have been infected, and the total number is likely far higher, security experts warn.

Mining 170
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Government faces possible defeat on press regulation votes

The Guardian Data Protection

Theresa May tells cabinet two amendments to data protection bill will undermine free press The government is facing two difficult votes, and potential defeats, over amendments to the data protection bill that are due to be debated in the Commons on Wednesday. The amendments would establish a “Leveson two” inquiry into the misuse of personal data by the media, and a measure that would impose punitive legal costs on English media organisations that refuse to sign-up to Impress, the officially reco

article thumbnail

Properly Framing the Cost of a Data Breach

Dark Reading

The expenses and actions typically associated with a cyberattack are not all created equal. Here's how to explain what's important to the C-suite and board.

article thumbnail

The Iran Nuclear Deal Unraveling Raises Fears of Cyberattacks

WIRED Threat Level

For the last three years, Iran has restrained its state-sponsored hackers from disruptive attacks on the West. That ceasefire may now be over.

IT 82
article thumbnail

Equifax: US Breach Victim Tally Stands at 146.6 Million

Data Breach Today

Unpatched Struts Implementations Remain Widespread, Researcher Warns Equifax says it continues to field queries from U.S. lawmakers about the full extent of its massive 2017 data breach, which occurred after an attacker exploited its unpatched Apache Struts web application. Research finds that many more organizations are using unpatched Struts applications.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ministers risk judicial review of plan to deny immigrants data access

The Guardian Data Protection

Campaign groups say clause preventing access to records will make EU citizens ‘second class’ The government is being warned that it will face judicial review proceedings in June unless it scraps a clause in the data protection bill that would prevent immigrants from accessing their Home Office records. The campaign groups the3million , a grassroots organisation representing EU citizens living in the UK, and the Open Rights Group argue that the exemption for data protection for immigrants is unla

Access 93
article thumbnail

Phishing Attack Bypasses Two-Factor Authentication

Dark Reading

Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

article thumbnail

What is free Hadoop costing you?

IBM Big Data Hub

By 2025, there will be 180 trillion gigabytes of data in the world, compared to only 10 trillion gigabytes in 2015. Of this, 90 percent will be unstructured, which is why many organizations are adopting open source data lake technologies such as Apache Hadoop to handle this expanding volume and variety of data.

71
article thumbnail

Report: Chinese Actors Steal Code-Signing Certificates

Data Breach Today

ProtectWise Says Group's Mistakes Proved Helpful During Investigation Security vendor ProtectWise says a series of operating mistakes has allowed it to gain insight into a group, believed to be affiliated with Chinese intelligence, that specializes in stealing code-signing certificates. The certificates allow for the signing of malware that's unlikely to raise security alarms.

Security 165
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Why the GDPR email deluge, and can I ignore it?

The Guardian Data Protection

A stringent new law will change how companies handle your data. Here’s what you need to do ‘Urgent action required ”, “Do you still want to hear from us?”, “We’ve updated our privacy policy”, “Should we stop sending you updates? If not, act now!” Many of us will have received emails like this during the past few weeks, some of them from companies we haven’t used for years or have maybe never even heard of.

GDPR 83
article thumbnail

Free download: Find out how ISO 27001 can help you comply with the GDPR

IT Governance

The EU General Data Protection Regulation (GDPR) comes into force next month, and states that organisations must adopt appropriate policies, procedures and processes to protect the personal data they hold. . Noncompliance can result in fines of up to €20 million or 4% of an organisation’s global annual turnover. Fortunately, ISO 27001 , the international standard that describes best-practice for implementing an information security management system (ISMS), can help you with your compl

GDPR 70
article thumbnail

Microsoft Enabling Javascript in Excel Has Security Pros Anxious

WIRED Threat Level

Enabling JavaScript should make Excel more powerful, but increasing access points makes it even more of a web security nightmare than it already is.

article thumbnail

Protecting the Industrial Internet of Things

Data Breach Today

Asif Effendi of GE Oil and Gas Offers Risk Mitigation Insights The industrial internet of things presents a significant new risk paradigm, says Asif Effendi of GE Oil and Gas, who offers threat mitigation tips.

Risk 150
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data rules threaten 'last avenue' used in thousands of immigration cases

The Guardian Data Protection

Home Office figures show there were almost 25,950 subject access requests for files in 2016 Tens of thousands of people each year could be prevented from obtaining information about their own immigration status under new data protection powers, Home Office figures reveal. Changes proposed in the data protection bill, which was being debated by MPs on Wednesday, would deprive applicants of a reliable means of obtaining files on themselves from the department through what are known as subject acce

Access 83
article thumbnail

Cloud service providers and the NIS Directive – are you resilient enough?

IT Governance

The EU Directive on security of network and information systems is required to be transposed into UK law by 9 May 2018. The domestic law, in force from 10 May 2018, will be known as the ‘NIS Regulations’. What is the objective of the NIS Regulations? The NIS Regulations aim to reduce the risk of disruption to critical services by requiring relevant organisations to protect their networks and information systems.

Cloud 68
article thumbnail

GandCrab Ransomware Found Hiding on Legitimate Websites

Threatpost

The GandCrab ransomware continues to virulently spread and adapt to shifting cyber-conditions, most recently crawling back into relevance on the back of several large-scale spam campaigns.