Sat.Jan 04, 2020 - Fri.Jan 10, 2020

article thumbnail

Eliminate the Password, Eliminate the Password Problem.

The Security Ledger

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there. The post Eliminate. Read the whole entry. » Related Stories Explained: Two-Factor vs.

article thumbnail

What Orwell's '1984' Missed: Free Social Media Apps

Data Breach Today

UAE Green Lights All-Access Social Messaging App, Blocks Rivals Not even George Orwell could have predicted nation-state surveillance in the 21st century. Give us free instant messaging for our smartphones, and faster than you can say "viral kitten video," we're collectively part of a mass surveillance nightmare. Case in point: The ToTok social messaging app.

Access 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In App Development, Does No-Code Mean No Security?

Dark Reading

No-code and low-code development platforms are part of application development, but there are keys to making sure that they don't leave security behind with traditional coding.

article thumbnail

Google Ditches Patch-Time Bug Disclosure in Favor of 90-Day Policy

Threatpost

Project Zero vulnerability disclosures will now happen at 90 days, even if a patch becomes available before then.

55
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

11 cyber security predictions for 2020

IT Governance

Almost everyone wants to know what the future has in store – particularly when it comes to cyber security. Keeping aware of the latest cyber threats and the best solutions to combat them will put organisations in a better position to prevent attacks. With that in mind, Geraint Williams, IT Governance’s chief information security officer, discusses his cyber security predictions in the upcoming year.

More Trending

article thumbnail

Tricky Phish Angles for Persistence, Not Passwords

Krebs on Security

Late last year saw the re-emergence of a nasty phishing tactic that allows the attacker to gain full access to a user’s data stored in the cloud without actually stealing the account password. The phishing lure starts with a link that leads to the real login page for a cloud email and/or file storage service. Anyone who takes the bait will inadvertently forward a digital token to the attackers that gives them indefinite access to the victim’s email, files and contacts — even af

Passwords 228
article thumbnail

5 Ways Data Modeling Is Critical to Data Governance

erwin

Enterprises are trying to manage data chaos. They might have 300 applications, with 50 different databases and a different schema for each one. They also face increasing regulatory pressure because of global data regulations , such as the European Union’s General Data Protection Regulation (GDPR) and the new California Consumer Privacy Act (CCPA), that went into effect last week on Jan. 1.

article thumbnail

Customer Experience Trends: How To Stand Out From the Crowd

Reltio

Customer experience trends might change from time to time, but the central component remains steady: The customer must be at the heart of every business decision that you make. In B. Joseph Pine and James G. Gilmore’s seminal 1999 book, The Experience Economy , they predicted a new economic era in which businesses would shift their focus from creating products or services to delivering memorable experiences to their customers.

article thumbnail

Router Cryptojacking Campaigns Disrupted

Data Breach Today

20,000 Hacked MikroTik Routers in Southeast Asia Were Malware-Infected Nearly 16,000 malware-infected MicroTik routers in Southeast Asia have been scrubbed of Coinhive cryptojacking code, which mines for monero, thanks to an international police operation. Globally, however, 26,000 MicroTik routers reportedly remain infected with the stealth monero-mining code.

Mining 242
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Alleged Member of Neo-Nazi Swatting Group Charged

Krebs on Security

Federal investigators on Friday arrested a Virginia man accused of being part of a neo-Nazi group that targeted hundreds of people in “swatting” attacks, wherein fake bomb threats, hostage situations and other violent scenarios were phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target’s address.

article thumbnail

Mainframe Transformation awaits @SHARE in Texas

Micro Focus

As a native Texan, I am excited to help host this event in my backyard of Fort Worth, Texas, on February 23-28. A short drive to the venue beats a long flight hands down. Why ‘Cowtown’? Fort Worth got its nickname “Cowtown” in the 1800s as it became the center of the cattle drives, and. View Article.

IT 101
article thumbnail

AutoAI: Synchronize ModelOps and DevOps to drive digital transformation

IBM Big Data Hub

AutoAI, a feature of IBM Watson Studio, helps application developers and data scientists work in concert to increase yields for model and app investments, and orchestrate ModelOps with DevOps.

article thumbnail

Voting Machine Firm CEOs Open to Greater Federal Oversight

Data Breach Today

Congress Wants Security Vulnerabilities Addressed to Thwart Foreign Interference The CEOs of the three largest voting machine manufacturers testified before a U.S. Congressional committee that they would be open to greater federal oversight of their equipment to help ensure the security of voting data in upcoming elections, including the 2020 presidential contest.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK accused of 'behaving like cowboys' over EU database copying

The Guardian Data Protection

Dutch Liberal MEP Sophie in ’t Veld says leaked report revealed ‘violations and abuse’ The British government has been accused of “behaving like a bunch of cowboys” after a confidential report revealed it had allowed illegal copying of an EU database. The issue, discussed publicly for the first time on Thursday, threatens to sour talks on the post-Brexit relationship between the UK and the EU, despite hopes on both sides for close ties in fighting crime and terrorism.

article thumbnail

Introducing Jamf Pro 10.18

Jamf

Our newest version of Jamf Pro will integrate Jamf Pro and Jamf Connect, offer native Office 365 management and includes Cloud Connector: simplifying Azure integration.

Cloud 96
article thumbnail

Catches of the month: Phishing scams for January 2020

IT Governance

Want to stay up to date with the latest phishing scams ? Our ‘catches of the month’ feature reviews the most prominent attacks across the web, explaining how they occurred and the steps you should take to stay safe. In our first review of 2020, we look at a new twist on a PayPal scam, and discuss data breaches at an IVF treatment facility and in the Singapore government. 1.

article thumbnail

Lawsuit Filed in Wake of Ransomware Attack

Data Breach Today

Ryuk Attack on DCH Health System Disrupted Patient Care Last Fall A lawsuit filed against DCH Health System in the wake of a ransomware attack that disrupted medical services for several days alleges that the Alabama-based organization failed "to properly maintain and safeguard its computer systems and data.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Facebook Bug Exposed Anonymous Admins of Pages

WIRED Threat Level

A bad code update allowed anyone to easily reveal which accounts posted to Facebook Pages—including celebrities and politicians—for several hours. .

Privacy 98
article thumbnail

How to configure Jamf Connect in Jamf Pro

Jamf

For the first time, Jamf Connect configurations are available in Jamf Pro. Combine powerful IT workflows, streamlined Mac authentication and identity management into one integrated experience.

article thumbnail

Data monetization in banking: Driving customer centricity and business value

CGI

Data monetization in banking: Driving customer centricity and business value. pooja.cs@cgi.com. Tue, 01/07/2020 - 23:50. Banks are awash with data of different types and formats, as well as different levels of detail. While all data is stored, banks use it for different purposes, such as regulatory compliance, customer behavior analysis, and other strategies.

article thumbnail

FBI Asks Apple For Access to Saudi Shooter's iPhones

Data Breach Today

Request Echoes 2016 Legal Standoff Between Apple and the FBI The FBI has sent a letter to Apple asking for help in accessing encrypted data from two iPhones belonging to a deceased shooter. The bureau's move may be a prelude to another legal fight between the FBI and Apple over strong encryption.

Access 195
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How the US Knew Iranian Missiles Were Coming Before They Hit

WIRED Threat Level

The US has operated an extensive network of missile warning systems for over half a century, but next-generation missiles will put it to the test.

IT 98
article thumbnail

2020 tech predictions from Jamf CEO

Jamf

Jamf CEO, Dean Hager, highlights four areas where he sees the technology industry expanding in 2020. Read this blog for full details.

104
104
article thumbnail

The Privacy Officers’ New Year’s Resolutions

Data Protection Report

1. Brace yourself (for export turbulence). 2020 could well be a year of data export turmoil – so brace yourself! The Court of Justice of the European Union (CJEU) will determine the validity of the EU Standard Contractual Clauses (SCCs) ( Data Protection Commissioner v Facebook Ireland Limited, Maximillan Schrems ) whilst the General Court of the EU will consider the future of Privacy Shield (La Quadrature du Net v Commission).

Privacy 84
article thumbnail

Patch or Perish: VPN Servers Hit by Ransomware Attackers

Data Breach Today

Pulse Secure Says Critical April 2019 Patch Protects Against Sodinokibi Too Attackers are hitting unpatched Pulse Secure VPN servers with Sodinokibi - aka REvil - ransomware, British security researcher Kevin Beaumont warns. Pulse Secure says that although many organizations have installed the critical April 2019 patch, holdouts persist.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Compliance and Privacy Partners and Ethikos to Speak at the 2020 MER Conference in Chicago

Information Governance Perspectives

The 2020 MER Conference Agenda has been announced and conference registration is now available. This year’s conference takes place May 4-6th in Chicago and features Information Governance sessions on Privacy, eDiscovery, Data Remediation, emerging technologies, and operational best practices from the industry’s leading experts, along with the experiences of knowledgeable practitioners.

article thumbnail

Information Advantage for Financial Services in 2020

OpenText Information Management

It’s that time again when we look ahead to the year to come. For 2020, we’re going to see financial services companies accentuate and accelerate the priorities of recent years. And we are going to witness the rise of Platformification as the way to achieve these long-standing goals. Financial Services and Insurance organizations will continue … The post Information Advantage for Financial Services in 2020 appeared first on OpenText Blogs.

article thumbnail

Chinese Malware Found Preinstalled on US Government-Funded Phones

Dark Reading

Researchers found unremovable malware preinstalled in the Unimax U686CL, a budget Android device sold by Assurance Wireless.