Sat.Aug 06, 2016 - Fri.Aug 12, 2016

article thumbnail

Thinking Through The Password Expiration Discussion

PerezBox

The most intriguing debate to come out of last weeks security conferences in Vegas stems from a presentation by FTC Chief Technologist Lorrie Cranor at PasswordsCon 2016, part of the BSides security conference in Las. Read More. The post Thinking Through The Password Expiration Discussion appeared first on PerezBox.

article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s State Administration for Industry and Commerce Publishes Draft Regulations on the Protection of Consumer Rights

Hunton Privacy

The State Administration for Industry and Commerce of the People’s Republic of China published a draft of its Implementing Regulations for the P.R.C. Law on the Protection of the Rights and Interests of Consumers (the “Draft”) for public comment. The draft is open for comment until September 5, 2016. The Draft reiterates the requirements under the law that business operators must follow the principles of legitimacy, rightfulness and necessity when they collect and use the personal information of

article thumbnail

Next-generation connected cars require a solid security foundation

CGI

Next-generation connected cars require a solid security foundation. shobana.lv@cgi.com. Wed, 08/10/2016 - 02:05. Connected cars demand the same level of attention as any other feature of a company’s network. In the past, a car’s electronic control systems were always internal, so there was no need to think about the communications happening outside the car.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Impact of the European General Data Protection Regulation (GDPR) on Adequacy and 5 Tips to Weather the Changes

Privacy and Cybersecurity Law

Recent media coverage has brought to light the internal deliberations of the Government of Canada regarding the possible impact of […].

GDPR 40

More Trending

article thumbnail

AIG Launches Cyber-BI and PD Policy

Hunton Privacy

As reported in the Hunton Insurance Recovery Blog , insurance-giant American International Group (“AIG”) announced that it will be the first insurer to offer standalone primary coverage for property damage, bodily injury, business interruption and product liability that results from cyber attacks and other cyber-related risks. According to AIG, “Cyber is a peril [that] can no longer be considered a risk covered by traditional network security insurance product[s].

article thumbnail

Final IRRBB regulations: Their implications and challenges

CGI

Final IRRBB regulations: Their implications and challenges. narmada.devarajan. Wed, 08/10/2016 - 06:32. The Basel Committee on Banking Supervision (BCBS) recently published final interest rate risk in the banking book (IRRBB) regulations. As defined by the BCBS, “IRRBB refers to the current or prospective risk to the bank’s capital and earnings arising from adverse movements in interest rates.

Risk 40
article thumbnail

Free Virtual Information Symposium 8/18

JKevinParker

My friends at Information Coalition are putting on a FREE Information Symposium on August 18. Register here for FREE: [link].

40
article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lack of long-term strategy puts vital digital information at risk

Preservica

Did you know that while 97% of information professionals understand the need for a specialised approach to preserving their digital information, only 12% are storing their files in systems specifically designed to ensure long-term protection and access? This gap has significant global, economic and societal implications. Preservica partnered with the Information Governance Initiative (IGI) think tank to carry out new research into organisations’ long-term digital preservation strategy, and it re

article thumbnail

OCR Settles Largest HIPAA Violation Against a Single Covered Entity

Hunton Privacy

On August 4, 2016, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with Advocate Health Care Network (“Advocate”), the largest health care system in Illinois, over alleged HIPAA violations. The $5.5 million settlement with Advocate is the largest settlement to date against a single covered entity.

Risk 53
article thumbnail

MAYHEM WINS DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CASE STUDY: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

IT 40
article thumbnail

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

IT 52
article thumbnail

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.

IT 40