Sat.Jul 20, 2019 - Fri.Jul 26, 2019

Culling & Review


The post Culling & Review appeared first on Zapproved. Best Practices Blog analytics culling discovery Document review ediscovery ediscovery cost ediscovery repository Processing

NEW TECH: Early adopters find smart ‘Zero Trust’ access improves security without stifling innovation

The Last Watchdog

As we approach the close of the second decade of the 21 st century, it’s stunning, though perhaps not terribly surprising, that abused logon credentials continue to fuel the never-ending escalation of cyber attacks. Related: Third-party risks exacerbated by the ‘gig economy’ Dare we anticipate a slowing — and ultimately the reversal – of this trend? Yes, I believe that’s now in order.

Access 120

Louisiana Declares Emergency After Malware Attacks

Data Breach Today

At Least One of Four School Districts Confirmed Ransomware Louisiana's governor issued an emergency declaration on Wednesday in response to a rash of malware infections, hitting some of the state's public schools. The move will allow the state to marshal more resources to deal with the incidents

The Unsexy Threat to Election Security

Krebs on Security

Much has been written about the need to further secure our elections, from ensuring the integrity of voting machines to combating fake news.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Transitioning GDPR preparations into successful operations

Information Management Resources

GDPR has now been in force for over a year, so would it be correct to assume that all organizations have taken the necessary steps to ensure compliance? GDPR Data security Data privacy

GDPR 114

More Trending

It's Official: FTC Fines Facebook $5 Billion

Data Breach Today

Mark Zuckerberg Must Ensure Compliance With Commission's Order The U.S. Justice Department and the Federal Trade Commission officially announced a privacy settlement with Facebook that includes a record-setting $5 billion fine.

IT 233

What You Should Know About the Equifax Data Breach Settlement

Krebs on Security

Big-three credit bureau Equifax has reportedly agreed to pay at least $650 million to settle lawsuits stemming from a 2017 breach that let intruders steal personal and financial data on roughly 148 million Americans.

Security pros are paranoid. Maybe we should all follow suit

Information Management Resources

Attackers are able to evade detection, disappear without a trace, automate their attacks, never leave the same set of fingerprints and fool even the savviest among us with spear phishing and social engineering schemes. Data security Cyber security Cyber attacks

German firms BASF, Siemens, Henkel hit by cyber attacks

Security Affairs

A new wave of cyber attacks carried out by a China-linked APT group hit German blue-chip companies BASF, Siemens, Henkel and others. On Wednesday, German blue-chip companies BASF, Siemens, Henkel along with a host of others confirmed they had been targeted by a wave of cyber attacks.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Marcus Hutchins Spared Prison Time in Malware Case

Data Breach Today

British Security Expert Pleaded Guilty to Creating Kronos Trojan Marcus Hutchins, who rose to fame by helping to stop the WannaCry ransomware attacks, was spared jail time on Friday after pleading guilty earlier this year to creating the Kronos banking malware

Neo-Nazi SWATters Target Dozens of Journalists

Krebs on Security

Nearly three dozen journalists at a broad range of major publications have been targeted by a far-right group that maintains a Deep Web database listing the personal information of people who threaten their views.

Groups 262

4 steps to becoming a more data-driven organization

Information Management Resources

Organizations must implement effective intelligent data management strategies that help them being able to access the right data at the right time and recover it when it’s lost or damaged. Digital transformation Data management Data strategy

Access 112

0v1ru$ hackers breach FSB contractor SyTech and expose Russian intel projects

Security Affairs

SyTech , a contractor for the Federal Security Service of the Russian Federation (FSB) has been hacked, attackers stole data about interna l projects.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Equifax Negotiates Potential $700 Million Breach Settlement

Data Breach Today

Deal Prepped With Feds and State Attorneys General Includes Victim Compensation Credit reporting giant Equifax has negotiated a proposed settlement that could reach $700 million to resolve federal and state probes into its massive 2017 data breach, as well as a nationwide class action lawsuit.

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Speaking at Fordham University in New York, he admitted that adding backdoors decreases security but that it is worth it.

The ethical use of data for training machine learning technology

Information Management Resources

The AI technology bias and its potentially unintended consequences is gaining the attention of policy makers, technology companies and civil liberties groups. Artificial intelligence Machine learning Corporate ethics

A flaw in LibreOffice could allow the hack of your PC

Security Affairs

LibreOffice users have to know that their unpatched computers could be hacked by simply opening a specially crafted document. Bad news for LibreOffice users, the popular free and open-source office suite is affected by an unpatched remote code execution vulnerability.

Consumer Advocates Criticize Equifax Settlement Plan

Data Breach Today

Two States Sit Out Proposed Settlement and Continue Their Own Lawsuits Equifax's move to settle federal and 48 states' probes, as well as class action lawsuits, would see breach victims being able to claim up to $20,000 for unreimbursed expenses.

Hackers Expose Russian FSB Cyberattack Projects

Schneier on Security

More nation-state activity in cyberspace, this time from Russia : Per the different reports in Russian media, the files indicate that SyTech had worked since 2009 on a multitude of projects since 2009 for FSB unit 71330 and for fellow contractor Quantum.

Bring your own identity (BYOI): New models of digital identity

Information Management Resources

As digital business grows across all industries, and data privacy continues to pose a significant risk to enterprises, the growing need for security includes a reliance on trust in digital identities. Digital ID Personally identifiable information Data types

Risk 107

China-Linked APT15 group is using a previously undocumented backdoor

Security Affairs

ESET researchers reported that China-linked cyberespionage group APT15 has been using a previously undocumented backdoor for more than two years.

Groups 100

Why Hackers Abuse Active Directory

Data Breach Today

From Ransomware to APT Attacks, AD Can Make Connecting to Systems Easy Warning: Attackers are abusing poorly secured and managed implementations of Microsoft Windows Active Directory to hack organizations and distribute ransomware.

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

Cyber espionage turned a corner this spring when Israeli fighter jets eradicated a building in the Gaza Strip believed to house Hamas cyber operatives carrying out attacks on Israel’s digital systems. Related: The Golden Age of cyber spying is upon us. That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This development underscores that we’re in the midst of a new age of cyber espionage.

Best practices for building an information governance program that will last

Information Management Resources

For this Q&A with Aaron Bryant, I asked about the signs that an IG program is in trouble, what the keys to success are, and how to overcome the obstacles to that success. Data governance Data management Data strategy

New APT34 campaign uses LinkedIn to deliver fresh malware

Security Affairs

The APT24 group continues its cyber espionage activity, its members were posing as a researcher from Cambridge to infect victims with three new malware. Experts at FireEye have uncovered a new espionage campaign carried out by APT34 APT group ( OilRig , and HelixKitten. Greenbug ) through LinkedIn.

Facebook Fixing Messenger Kids App Flaw

Data Breach Today

Social Media Firm Sending Out Notifications to 'Thousands' of Parents Facebook is fixing a design flaw in its Messenger Kids app that allowed children under the age of 13 to enter into group chats with adults without their parents' permission

Groups 220

Why EA Needs to Be Part of Your Digital Transformation Strategy


Enterprise architecture (EA) isn’t dead, you’re just using it wrong. Part three of erwin’s digital transformation blog series. . I’ll let you in on a little secret: the rumor of enterprise architecture’s demise has been greatly exaggerated.

Government and education sectors will be especially transformed by AI

Information Management Resources

A majority of federal, state and local government and higher education IT managers say artificial intelligence will be a game changer in the way their industry thinks about and processes data. Artificial intelligence Machine learning Digital transformation

US authorities have sentenced to prison 3 Romanian men who hacked US servers

Security Affairs

Three Romanian men who have been sentenced to prison for a fraud scheme totaling more than $21 million. US authorities have sentenced to prison three Romanian men who hacked US servers and used them in a fraud scheme that totaled more than $21 million.

Massive Botnet Attack Used More Than 400,000 IoT Devices

Data Breach Today

Researchers at Imperva Say Incident Mimicked Mirai-Style DDoS Attack A massive botnet attack earlier this year utilized more than 400,000 connected devices over the course of 13 days, according to researchers at the security firm Imperva

IoT 215

$700 Million Equifax Fine Is Still Too Little, Too Late

WIRED Threat Level

For failing to safeguard Social Security numbers, credit card numbers, and more, Equifax will pay up—but not enough, experts say. Security Security / Security News