Sat.Mar 10, 2018 - Fri.Mar 16, 2018

article thumbnail

Will Tight Budget Impede OCR's HIPAA Mission?

Data Breach Today

While the director of the HHS Office for Civil Rights says HIPAA enforcement remains a top priority for the agency, obtaining enough resources to carry out its mission is an ongoing battle, says former OCR official Deven McGraw.

IT 174
article thumbnail

The Pushmi-Pullyu Impact of Technology Innovation on Information Preservation

AIIM

It’s bad enough that those of us in the technology space use three letter acronyms as if we’re being paid per usage. So here's a quick definition of terms for those mystified by the title of this post. If you are not conversant in Dr. Doolittle (even the Eddie Murphy version), Pushmi-Pullyu is a "gazelle-unicorn cross that has two heads (one of each) at opposite ends of its body.".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to detect a phishing email

IT Governance

Phishing has been used as a way for criminal hackers to gain sensitive information since the mid-1990s. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information. Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient into believing that the message is important and convince them to click a malicious link/attachment or provide sensitive d

Phishing 111
article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

Libraries 107
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Power Company Fined $2.7 Million Over Data Exposure

Data Breach Today

Grid Regulator Says Company Left Critical Data Exposed for 70 Days A U.S. power company, unnamed by regulators, has been fined a record $2.7 million for violating energy sector cybersecurity regulations after sensitive data - including cryptographic information for usernames and passwords - was exposed online for 70 days.

Passwords 166

More Trending

article thumbnail

Hacker Adrian Lamo Has Died at 37

WIRED Threat Level

The Colombian-American hacker became famous in the early 2000s for breaking into the systems at organizations like *The New York Times*, and later for his role in Chelsea Manning's arrest.

Security 107
article thumbnail

Reader favorites March 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to digitize paper documents, how to take the risk out of records retention, and how to decide if custom folders are right for your organization. Five keys to a successful digital document conversion Planning to digitize your files? [.] Read More. The post Reader favorites March 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Federal Judge: Yahoo Breach Victims Can Sue

Data Breach Today

Plaintiffs Claim Spam and Card Fraud Resulted From Breach of 3 Billion Accounts A federal judge has largely rejected a motion by Verizon to dismiss a class-action suit filed by victims of three data breaches that compromised Yahoo, which is now part of Verizon. The Yahoo breaches appeared to have compromised nearly every Yahoo user's personal details at least once.

article thumbnail

Migration is a good opportunity for some immediate quality wins

AIIM

The movement to the cloud is past the tipping point. Cloud solutions are no longer a question of “should we?” but rather “when?” Organizations may not be ready to go 100% to the cloud, but for nearly 80% of organizations, cloud is a critical part of their strategy. Consider this data from a Fall 2017 AIIM survey of 182 end user organizations: How do you view your delivery/deployment methods for content management over the next 2 years?

Cloud 89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

YouTube Will Link Directly to Wikipedia to Fight Conspiracy Theories

WIRED Threat Level

After a series of scandals related to misinformation, YouTube CEO Susan Wojcicki announced the company would begin directing users to sources like Wikipedia.

Security 110
article thumbnail

Celebrating Db2’s 25 years of awesome

IBM Big Data Hub

March 16, 2018 is the 25th anniversary of the Db2 relational database product on Linux UNIX and Windows. Over the past 25 years, this team has built the Db2 brand for the distributed product, complementing IBM’s Db2 mainframe offering and creating a market force.

article thumbnail

State Department Spends $0 of Anti-Propaganda Allocation

Data Breach Today

Congress Has Allocated $120 Million Since 2016 to Combat Foreign Campaigns To the surprise of many, $120 million allocated by Congress since late 2016 to help the State Department combat foreign governments' U.S.-focused propaganda and disinformation campaigns hasn't been spent. Meanwhile, midterm U.S. elections are fast approaching.

article thumbnail

Is All Encryption Equal?

Thales Cloud Protection & Licensing

Data encryption has been around almost since the age of computers. In truth, anyone with minimal experience can write a simple script that uses default services built into virtually every OS to encrypt data. In Linux, for instance, it takes four openSSL commands to generate an encryption key and encrypt data. However, simply encrypting data is not a sufficient control when storing data in the cloud.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Taking down Gooligan: part 1 — overview

Elie

This series of posts recounts how, in November 2016, we hunted for and took down Gooligan, the infamous Android OAuth stealing botnet. What makes Gooligan special is its weaponization of OAuth tokens, something that was never observed in mainstream crimeware before. At its peak, Gooligan had hijacked over 1M OAuth tokens in an attempt to perform fraudulent Play store installs and reviews.

article thumbnail

Where to start with GDPR compliance

IT Governance

The first few steps of your EU General Data Protection Regulation (GDPR) compliance project can be the most confusing. Where to start, who should be involved and how to meet all your obligations are just a few of the questions you will undoubtedly ask, and the entire process can seem incredibly daunting. What is the GDPR and does your organisation need to comply?

GDPR 91
article thumbnail

Health Data Breaches Added to Tally Vary Widely

Data Breach Today

Malware, Mailing Errors and More Reported on the 'Wall of Shame' Large breaches involving hackers continue to plague the healthcare sector this year, but incidents involving lower-tech issues, including mailing errors, also are persisting.

article thumbnail

WhatsApp sharing user data with Facebook would be illegal, rules ICO

The Guardian Data Protection

Data protection watchdog forces firm to sign an undertaking declaring it will not share user data with parent company before GDPR The UK’s data protection watchdog has concluded that WhatsApp’s sharing of user data with its parent company Facebook would have been illegal. The messaging app was forced to pause sharing of personal data with Facebook in November 2016, after the Information Commissioner’s Office said it had cause for concern.

GDPR 87
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Florida Bill Would Make Criminal Justice Data More Transparent Than Ever

WIRED Threat Level

A newly passed bill in the Florida Legislature would bring unprecedented levels of transparency to the criminal justice system.

Security 101
article thumbnail

The 600+ Companies PayPal Shares Your Data With

Schneier on Security

One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here's a good visualization of that data. Is 600 companies unusual? Is it more than average?

GDPR 79
article thumbnail

5 Ways to Improve Insider Threat Prevention

Data Breach Today

If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.

article thumbnail

How to create an ISO 27001-compliant risk treatment plan

IT Governance

As part of your ISO 27001 certification project, your organisation will need appropriate documentation to prove its compliance. The risk treatment plan (RTP) is one of the mandatory reports that you will need to produce for your information security management system (ISMS). Key elements of the risk treatment plan. Clause 6.1.2 of the Standard focuses on the information security risk assessment and requires organisations to “prioritize the analysed risks for risk treatment”.

Risk 78
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Youtube, Facebook, and Google Can't Expect Wikipedia to Cure the Internet

WIRED Threat Level

YouTube and other tech giants have repeatedly turned to Wikipedia to help solve some of their biggest problems—often without giving back.

article thumbnail

Singapore Joins APEC Cross-Border Privacy Rules System and Privacy Recognition for Processors Program

Data Matters

On March 6, 2018, Singapore announced that it has joined the APEC Cross-Border Privacy Rules (CBPR) system as well as the APEC Privacy Recognition for Processors (PRP) program. Singapore is the sixth member of the CBPR system, which includes Canada, Japan, Korea, Mexico and the United States, and is the second member of the PRP program after the US.

Privacy 68
article thumbnail

AMD Chipset Flaws Are Real, But Experts Question Disclosure

Data Breach Today

Was AMD Ambushed? A set of vulnerabilities in AMD chipsets that gives attackers enduring persistence on machines appears to be legitimate. But experts are questioning the motivations of the Israeli security company that found the flaws, contending it ambushed AMD to maximize attention.

Security 133
article thumbnail

Customer experience as a catalyst for digital transformation

OpenText Information Management

With 63% of Financial Services organizations either planning or formally engaged in digital transformation initiatives, how does a financial brand drive conversion, create loyalty and maintain a competitive edge? Customer experience is a catalyst in many digital transformation projects, as businesses invest in new digital technologies and processes to more effectively engage customers, partners or … The post Customer experience as a catalyst for digital transformation appeared first on Ope

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How Creative DDOS Attacks Still Slip Past Defenses

WIRED Threat Level

While some major distributed-denial-of-service attacks have been thwarted this month, the threat remains as critical as ever.

article thumbnail

The practical steps for conducting a data flow audit

IT Governance

A data flow is a transfer of information from one location to another. To keep track of this information, organisations should consider data flow mapping. The process will help an organisation identify key gaps and the necessary steps to establish what data it has and where it flows to. Organisations need to be aware of what data they process and ensure it is processed in accordance with the law.

article thumbnail

Winter Olympics Gold Medal for False Flag Goes to. ?

Data Breach Today

Researchers: To Foil Attribution, Attackers Planted Code Previously Tied to Lazarus Group Whoever unleashed malware built to disrupt last month's Winter Olympics in Pyeongchang, South Korea, designed it to look like it had been executed by a group of hackers tied to North Korea. But researchers at the security firm Kaspersky Lab say any such attribution would be false.

Security 133