Sat.Nov 02, 2019 - Fri.Nov 08, 2019

Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone


Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies.

The Growing Presence (and Security Risks) of IoT

Thales eSecurity

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today.

Website Cookie Consent: Is the Cookie Starting to Crumble?

Data Matters

Two important decisions have recently occurred relating to website operators’ use of cookies.

Where should information management live in the organization?


I returned to downtown Washington, DC, last week to teach the AIIM Foundations of Intelligent Information Management (FIIM) course. The class started with some icebreaker exercises, including asking the students to define, in their own words, “ What is information management? There were some fantastic definitions generated from the students for this and other discussion questions throughout the course.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Bill Would Create a Federal Digital Privacy Agency

Data Breach Today

Legislation Spells Out Privacy Rights and Enforcement Measures Two Democratic members of the U.S. House have proposed a national privacy law that calls for the formation of a new federal agency to enforce the privacy rights that it defines

More Trending

Predictive analytics for detection and response

OpenText Information Management

Enterprise security professionals today can prevent many attacks on their organization’s endpoints, thanks to ever-improving defensive tools that work across public and private clouds as well as on premise.

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits.

Following Massive Breach, Capital One Replacing CISO: Report

Data Breach Today

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

The Last Watchdog

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

So, what did I think of ARMA InfoCon 2019? Here, let me tell you!

Weissman's World

ARMA InfoCon 2019 was an eye-opener, thanks in large part to a healthy injection of information governance into the proceedings. Thanks, no doubt, to the merger of the Information Coalition with ARMA last year.)

NCR Barred Mint, QuickBooks from Banking Platform During Account Takeover Storm

Krebs on Security

Banking industry giant NCR Corp. [ NYSE: NCR ] late last month took the unusual step of temporarily blocking third-party financial data aggregators Mint and QuicBooks Online from accessing Digital Insight , an online banking platform used by hundreds of financial institutions.

Analysis: Using Twitter for Espionage

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks

NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

The Last Watchdog

From the start, two-factor authentication, or 2FA , established itself as a simple, effective way to verify identities with more certainty. Related: A primer on IoT security risks The big hitch with 2FA, and what it evolved into – multi-factor authentication, or MFA – has always been balancing user convenience and security.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

How Adopting A Zero Trust Mentality Is Positive When It Comes To Staying Secure In the Cloud

Thales eSecurity

In a previous blog post ( [link] ) we explored the relationship between GPDR and applications in the cloud. Trust is generally the foundation and basis of any good relationship, but when it comes to protecting your organization, sometimes a Zero Trust mentality is your best bet.

Italian police shut down darkweb Berlusconi market and arrested admins

Security Affairs

Italian law enforcement shut down the ‘Berlusconi market’ black market and arrested three suspected of being its administrators.

Update: PCI SSC's Enhanced Contactless Payment Standard

Data Breach Today

In December, PCI SSC plans to publish a new standard for solutions that enable "tap and go" transactions on merchant smartphones and other commercial off-the shelf mobile devices.

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

The Last Watchdog

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools at their beck and call. Yet the majority feel unsatisfied with narrow daily assignments and increasingly disconnected from the strategic goals of their parent organization.

B2B 100

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

HSTS From Top to Bottom or GTFO

Troy Hunt

We're pretty much at a "secure by default" internet these days, at least that's the assumption with most websites, particularly so in the financial sector.

Specially Crafted ZIP archives allow bypassing secure email gateways

Security Affairs

Experts observed a new phishing campaign that used a specially crafted ZIP archive that was designed to bypass secure email gateways to distribute malware.

Health Data Breach Tally Update: Top Causes

Data Breach Today

An Analysis of the Latest Trends - and What's Ahead Hacker attacks, IT mishaps, and vendor errors are among the top causes of the largest health data breaches added to the official federal tally so far this year. Here's an update

Top Application Security Products

eSecurity Planet

Application security is a widespread problem. These security tools can help find and fix application vulnerabilities before hackers exploit them

Addressing the skills shortage in security

OpenText Information Management

Cybersecurity incidents currently represent one of the biggest threats to organizations.

First Cyber Attack ‘Mass Exploiting’ BlueKeep RDP Flaw Spotted in the Wild

Security Affairs

Experts have spotted the first mass-hacking campaign exploiting the BlueKeep exploit , crooks leverage the exploit to install a cryptocurrency miner.

Sen. Wyden Pushes FCC on 5G Security

Data Breach Today

Lawmaker Asks for Encryption and Authentication Requirements U.S. Senator Ron Wyden is pushing the Federal Communications Commission to ensure that wireless carriers build new security measures, such as encryption and authentication, into 5G networks as they're rolled out over the next several year

#COBOL60: Your COBOL questions, answered – Part Two

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel.

IT 71

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

WIRED Threat Level

By pointing lasers tuned to a precise frequency at a smart assistant, researchers could force it to unlock cars, open garage doors, and more. Security Security / Cyberattacks and Hacks

IT 72

Germany: Berlin data protection authority imposes EUR 14.5 million fine for “data cemetery”

DLA Piper Privacy Matters

On 30 October 2019, the Berlin Commissioner for Data Protection and Freedom of Information ( Berliner Beauftragte für Datenschutz und Informationsfreiheit – “ Berlin DPA ”) imposed an administrative fine of about EUR 14.5