Sat.Jul 20, 2019 - Fri.Jul 26, 2019

article thumbnail

Culling & Review

Zapproved

The post Culling & Review appeared first on Zapproved.

article thumbnail

NEW TECH: Early adopters find smart ‘Zero Trust’ access improves security without stifling innovation

The Last Watchdog

Access 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Louisiana Declares Emergency After Malware Attacks

Data Breach Today

At Least One of Four School Districts Confirmed Ransomware Louisiana's governor issued an emergency declaration on Wednesday in response to a rash of malware infections, hitting some of the state's public schools. The move will allow the state to marshal more resources to deal with the incidents.

article thumbnail

The Unsexy Threat to Election Security

Krebs on Security

Much has been written about the need to further secure our elections, from ensuring the integrity of voting machines to combating fake news. But according to a report quietly issued by a California grand jury this week, more attention needs to be paid to securing social media and email accounts used by election officials at the state and local level.

Security 179
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ACT police admit they unlawfully accessed metadata more than 3,000 times

The Guardian Data Protection

Police seeking legal advice about two cases that resulted in information that ‘may have been used in a prosecution’ ACT Policing has admitted it unlawfully accessed citizens’ metadata a total of 3,365 times, not 116 as previously disclosed in an explosive commonwealth ombudsman’s report on Monday. The new disclosures include a total of 240 cases that resulted in information valuable to criminal investigations and two that “may have been used in a prosecution”.

Metadata 110

More Trending

article thumbnail

Equifax Negotiates Potential $700 Million Breach Settlement

Data Breach Today

Deal Prepped With Feds and State Attorneys General Includes Victim Compensation Credit reporting giant Equifax has negotiated a proposed settlement that could reach $700 million to resolve federal and state probes into its massive 2017 data breach, as well as a nationwide class action lawsuit. The company's total post-breach tab is likely to exceed $2 billion.

article thumbnail

Why EA Needs to Be Part of Your Digital Transformation Strategy

erwin

Enterprise architecture (EA) isn’t dead, you’re just using it wrong. Part three of erwin’s digital transformation blog series. . I’ll let you in on a little secret: the rumor of enterprise architecture’s demise has been greatly exaggerated. However, the truth for many of today’s fast-moving businesses is that enterprise architecture fails. But why?

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Speaking at Fordham University in New York, he admitted that adding backdoors decreases security but that it is worth it. Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access.

article thumbnail

The War for Cyber Talent Will Be Won by Retention not Recruitment

Dark Reading

Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

109
109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

It's Official: FTC Fines Facebook $5 Billion

Data Breach Today

Mark Zuckerberg Must Ensure Compliance With Commission's Order The U.S. Justice Department and the Federal Trade Commission officially announced a privacy settlement with Facebook that includes a record-setting $5 billion fine. As part of the agreement, CEO Mark Zuckerberg must submit quarterly and annual reports to show that the company is in compliance with the FTC order.

IT 227
article thumbnail

AIIM Virtual Event Explores Real-World IIM Success Stories

AIIM

Wouldn’t it be nice to hear first-hand, from one of your peers, about the Intelligent Information Management technologies and tools that they have applied in the real world to accomplish a specific digital transformation goal? That’s what we’ll be discussing when I host AIIM’s next virtual event on Thursday, July 25th, from 1pm-3pm. Join us for this live online video session as thought leaders in a variety of industries share their success stories and how they’ve made a difference.

article thumbnail

0v1ru$ hackers breach FSB contractor SyTech and expose Russian intel projects

Security Affairs

SyTech , a contractor for the Federal Security Service of the Russian Federation (FSB) has been hacked, attackers stole data about interna l projects. Attackers have hacked SyTech, a contractor for the Federal Security Service of the Russian Federation (FSB), and exfiltrated data about interna l projects. According to the Russian media, SyTech has been working with FSB since 2009, in particular, they contributed to several projects for FSB unit 71330 and for fellow contractor Quantum.

article thumbnail

DEF CON Invites Kids to Crack Campaign Finance Portals

Dark Reading

DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.

98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Marcus Hutchins Spared Prison Time in Malware Case

Data Breach Today

British Security Expert Pleaded Guilty to Creating Kronos Trojan Marcus Hutchins, who rose to fame by helping to stop the WannaCry ransomware attacks, was spared jail time on Friday after pleading guilty earlier this year to creating the Kronos banking malware.

article thumbnail

Just 10 commands, then keep learning

Jamf

Scripting helps Jamf admins to get the most out of Jamf, but it can be intimidating at first. For those of you thinking “scripting terrifies me,” this blog post is for you.

IT 89
article thumbnail

German firms BASF, Siemens, Henkel hit by cyber attacks

Security Affairs

A new wave of cyber attacks carried out by a China-linked APT group hit German blue-chip companies BASF, Siemens, Henkel and others. On Wednesday, German blue-chip companies BASF, Siemens, Henkel along with a host of others confirmed they had been targeted by a wave of cyber attacks. German media reported that the cyber attacks were launched by China-linked cyberespionage group.

article thumbnail

Hackers Expose Russian FSB Cyberattack Projects

Schneier on Security

More nation-state activity in cyberspace, this time from Russia : Per the different reports in Russian media, the files indicate that SyTech had worked since 2009 on a multitude of projects since 2009 for FSB unit 71330 and for fellow contractor Quantum. Projects include: Nautilus -- a project for collecting data about social media users (such as Facebook, MySpace, and LinkedIn).

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Consumer Advocates Criticize Equifax Settlement Plan

Data Breach Today

Two States Sit Out Proposed Settlement and Continue Their Own Lawsuits Equifax's move to settle federal and 48 states' probes, as well as class action lawsuits, would see breach victims being able to claim up to $20,000 for unreimbursed expenses. But some consumer advocates and government officials say the proposed deal is insufficient, given the magnitude of Equifax's failures.

article thumbnail

'Anonymised' data can never be totally anonymous, says study

The Guardian Data Protection

Findings say it is impossible for researchers to fully protect real identities in datasets “Anonymised” data lies at the core of everything from modern medical research to personalised recommendations and modern AI techniques. Unfortunately, according to a paper, successfully anonymising data is practically impossible for any complex dataset. An anonymised dataset is supposed to have had all personally identifiable information removed from it, while retaining a core of useful information for res

Paper 88
article thumbnail

A flaw in LibreOffice could allow the hack of your PC

Security Affairs

LibreOffice users have to know that their unpatched computers could be hacked by simply opening a specially crafted document. Bad news for LibreOffice users, the popular free and open-source office suite is affected by an unpatched remote code execution vulnerability. Recently, LibreOffice released the latest version 6.2.5 that addresses two severe flaws tracked as CVE-2019-9848 and CVE-2019-9849.

article thumbnail

Are you really going to save money by moving to the cloud?

DXC Technology

The number one reason most people move to the cloud is to save money. But, will you really? Sure you’re guaranteed to reduce your Capital Expenditure (CAPEX). But, if you’re not careful all you’ll end up doing is replacing your CAPEX expenses with cloud service Operating Expense (OPEX). So, before you sign the dotted line […].

Cloud 86
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Why Hackers Abuse Active Directory

Data Breach Today

From Ransomware to APT Attacks, AD Can Make Connecting to Systems Easy Warning: Attackers are abusing poorly secured and managed implementations of Microsoft Windows Active Directory to hack organizations and distribute ransomware. Fewer old operating systems and greater Active Directory security knowledge are helping mitigate the threat. But experts say more must be done.

article thumbnail

Software Developers and Security

Schneier on Security

According to a survey : "68% of the security professionals surveyed believe it's a programmer's job to write secure code, but they also think less than half of developers can spot security holes." And that's a problem. Nearly half of security pros surveyed, 49%, said they struggle to get developers to make remediation of vulnerabilities a priority. Worse still, 68% of security professionals feel fewer than half of developers can spot security vulnerabilities later in the life cycle.

article thumbnail

China-Linked APT15 group is using a previously undocumented backdoor

Security Affairs

ESET researchers reported that China-linked cyberespionage group APT15 has been using a previously undocumented backdoor for more than two years. Security researchers at ESET reported that China-linked threat actor APT15 (aka Ke3chang , Mirage , Vixen Panda , Royal APT and Playful Dragon) has been using a previously undocumented backdoor for more than two years.

article thumbnail

Popular Samsung, LG Android Phones Open to ‘Spearphone’ Eavesdropping

Threatpost

A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses.

Privacy 83
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Facebook Fixing Messenger Kids App Flaw

Data Breach Today

Social Media Firm Sending Out Notifications to 'Thousands' of Parents Facebook is fixing a design flaw in its Messenger Kids app that allowed children under the age of 13 to enter into group chats with adults without their parents' permission.

IT 208
article thumbnail

6 Actions that Made GDPR Real in 2019

Dark Reading

In the wake of recent fines levied against British Airways, Marriott, and Facebook, companies are starting to take data privacy and security more seriously.

GDPR 87
article thumbnail

Hackers breach 62 US colleges by allegedly exploiting Ellucian Banner Web flaw

Security Affairs

Hackers breached at least 62 college and university networks exploiting a flaw in Ellucian Banner Web Tailor, a module of the Ellucian Banner ERP. US Department of Education warned that hackers have breached at least 62 college and university networks by exploiting a vulnerability in the Ellucian Banner Web Tailor module of the Ellucian Banner ERP. The module is used by colleges and universities to customize their web applications.