Sat.Jun 15, 2019 - Fri.Jun 21, 2019

Data, Surveillance, and the AI Arms Race

Schneier on Security

According to foreign policy experts and the defense establishment , the United States is caught in an artificial intelligence arms race with China -- one with serious implications for national security.

Is Your Data Safe in the Cloud?

Thales eSecurity

As organizations move more of their sensitive data to cloud platforms for the efficiency, flexibility and scalability that it promises, security and control continue to be a significant obstacle to this adoption.

Cloud 122

Why Data Now Makes Every Company a Tech Company

Perficient Data & Analytics

Along with countless others in the IT consulting space, I’ve written about the challenges facing businesses as they undergo their various digital transformation initiatives.

Privileged Attack Vectors: Key Defenses

Data Breach Today

Access 252

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy

Krebs on Security

A medical billing firm responsible for a recent eight-month data breach that exposed the personal information on nearly 20 million Americans has filed for bankruptcy, citing “enormous expenses” from notifying affected consumers and the loss of its four largest customers.

Events 211

More Trending

Tricky Scam Plants Phishing Links in Your Google Calendar

WIRED Threat Level

Scammers are taking advantage of default calendar settings to try to trick users into clicking malicious links. Security Security / Cyberattacks and Hacks

How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How To 243

Linux worm spreading via Exim servers hit Azure customers

Security Affairs

On Friday, security experts at Microsoft warned of a new Linux worm, spreading via Exim ema i l servers, that already compromised some Azure installs.

Risks of Password Managers

Schneier on Security

Stuart Schechter writes about the security risks of using a password manager. It's a good piece, and nicely discusses the trade-offs around password managers: which one to choose, which passwords to store in it, and so on. My own Password Safe is mentioned.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount

WIRED Threat Level

Three cybersecurity firms have identified phishing attacks stemming from Iran—that may lay the groundwork for something more destructive. Security Security / Cyberattacks and Hacks

Hacked With Words: Email Attack Sophistication Surges

Data Breach Today


Crooks exploit exposed Docker APIs to build AESDDoS botnet

Security Affairs

Cybercriminals are attempting to exploit an API misconfiguration in Docker containers to infiltrate them and run the Linux bot AESDDoS.

Trends 108

Quantum-Resistant TLS in Go

Thales eSecurity

Quantum computing attacks may have already begun. Confidential data is being exchanged using algorithms that will eventually be broken by quantum computers.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

A Plan to Stop Breaches With Dead Simple Database Encryption

WIRED Threat Level

Database giant MongoDB has a new encryption scheme that should help slow the scourge of breaches. Security Security / Security News

Oregon Agency's Breach Tally Nearly Doubles

Data Breach Today

State's Department of Human Services Now Says 645,000 Affected The number of individuals affected by a phishing-related breach disclosed in March by the Oregon Department of Human Services has nearly doubled, according to a new notification statement, which offers more details

From Targeted Attack to Untargeted Attack

Security Affairs

Today I’d like to share an interesting and heavily obfuscated Malware which made me thinking about the meaning of ‘Targeted Attack’ Nowadays a Targeted Attack is mostly used to address state assets or business areas.

Hacking Hardware Security Modules

Schneier on Security

Security researchers Gabriel Campana and Jean-Baptiste Bédrune are giving a hardware security module (HSM) talk at BlackHat in August: This highly technical presentation targets an HSM manufactured by a vendor whose solutions are usually found in major banks and large cloud service providers.

The Importance of EA/BP for Mergers and Acquisitions


Over the past few weeks several huge mergers and acquisitions (M&A) have been announced, including Raytheon and United Technologies , the Salesforce acquisition of Tableau and the Merck acquisition of Tilos Therapeutics.

Troy Hunt: Why Data Breaches Persist

Data Breach Today

More Data, Use of the Cloud and IoT Presage Even More Big, Bad Breaches Bad news for anyone who might have hoped that the data breach problem was getting better. Anecdotally, it just feels like we're seeing a massive increase recently," says Troy Hunt, the creator of the free "Have I Been Pwned?"

The Riviera Beach City pays $600,000 in ransom

Security Affairs

The Riviera Beach City, Florida, agreed to pay $600,000 in ransom to decrypt its data after a ransomware-based attack hit its computer system. The Riviera Beach City Council voted unanimously to pay $600,000 in ransom to decrypt its records after a ransomware attack hit its systems.

Fake News and Pandemics

Schneier on Security

When the next pandemic strikes, we'll be fighting it on two fronts. The first is the one you immediately think about: understanding the disease, researching a cure and inoculating the population.

Video 93

SHARE @ Pittsburgh: On the road again

Micro Focus

I often go from city-to-city and every time I hit the road I hear this song. You know the one. Of course, our customers are on a road of their own. But instead of being inspired by Willie Nelson or their favorite rock band, it is new business requirements, market demands and the need to.

NASA's Jet Propulsion Lab a Frequent Hack Victim: Audit

Data Breach Today

Bird Miner, a macOS miner that runs by emulating Linux

Security Affairs

Security experts at Malwarebytes have discovered a new macOS crypto miner, tracked as Bird Miner, that works by emulating Linux. Researchers at MalwareBytes have spotted a new cryptominer, tracked as Bird Miner, that targets macOS and emulates Linux.

How Apple's "Find My" Feature Works

Schneier on Security

Matthew Green intelligently speculates about how Apple's new "Find My" feature works. If you haven't already been inspired by the description above, let me phrase the question you ought to be asking: how is this system going to avoid being a massive privacy nightmare?

Chart your path in Business Networks: Tackling the integration challenge…

OpenText Information Management

Never before have organizations had to deal with so many data sources as they do today.

Blog 87

AMCA Bankruptcy Filing in Wake of Breach Reveals Impact

Data Breach Today

Court Documents Outline a 'Host of Negative Consequences' The parent company of American Medical Collection Agency has filed for bankruptcy in the wake of a data breach affecting millions of patients.

XSS flaw would have allowed hackers access to Google’s network and impersonate its employees

Security Affairs

Bug hunter Thomas Orlita discovered an XSS vulnerability in Google’s Invoice Submission Portal that would have allowed attackers access to Google’s internal network.

Access 105

Maciej Ceg?owski on Privacy in the Information Age

Schneier on Security

Maciej Ceg?owski

How to succeed in a career in data governance

Information Management Resources

If you want to transition to a data governance career, it's possible to do so and embark on a path that leads to lasting satisfaction and success. Here are some practical steps you should take. Career moves Data governance Data Scientist Career planning

DHS Is Latest to Warn of BlueKeep Vulnerability

Data Breach Today

Agency Says It Tested Remote Code Execution Exploit Yet another warning has been issued about the BlueKeep vulnerability in older versions of Microsoft Windows. The latest comes from the Department of Homeland Security, which tested a remote code execution exploit