Sat.Dec 28, 2019 - Fri.Jan 03, 2020

article thumbnail

How Cybersecurity's Metrics of Misery Fail to Describe Cybercrime Pain

Dark Reading

Dollars lost and data records exposed are valuable measurements, but the true pain of a cybersecurity incident goes far beyond that. We asked infosec pros how they put words to the pain they feel when their defenses fall apart.

article thumbnail

Mean Time to Hardening: The Next-Gen Security Metric

Threatpost

Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Promiscuous Cookies and Their Impending Death via the SameSite Policy

Troy Hunt

Cookies like to get around. They have no scruples about where they go save for some basic constraints relating to the origin from which they were set. I mean have a think about it: If a website sets a cookie then you click a link to another page on that same site, will the cookie be automatically sent with the request? Yes. What if an attacker sends you a link to that same website in a malicious email and you click that link, will the cookie be sent?

Passwords 114
article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection from natural disasters, theft, vandalism, and terrorism. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

Risk 121
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Understanding the data downtime gap — and how to fix it

Information Management Resources

The growing dependence on information, plus the sheer amount of it, has led to something called the data downtime gap. Here's a look at what that is and how companies can address it.

IT 51

More Trending

article thumbnail

7 Tips for Maximizing Your SOC

Threatpost

Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.

article thumbnail

Happy 10th Birthday, KrebsOnSecurity.com

Krebs on Security

Today marks the 10th anniversary of KrebsOnSecurity.com! Over the past decade, the site has featured more than 1,800 stories focusing mainly on cybercrime, computer security and user privacy concerns. And what a decade it has been. Stories here have exposed countless scams, data breaches, cybercrooks and corporate stumbles. In the ten years since its inception, the site has attracted more than 37,000 newsletter subscribers, and nearly 100 million pageviews generated by roughly 40 million unique

article thumbnail

Predicting the top 7 trends in manufacturing for 2020

OpenText Information Management

After starting the year strongly, manufacturing left 2019 faced with shrinking production and global uncertainty. Deloitte suggests manufacturers should increase the resilience in their operations while building and improving their ‘digital muscle’. So how will this translate into the major technology trends in manufacturing for 2020? Manufacturers will have to navigate the data tsunami From … The post Predicting the top 7 trends in manufacturing for 2020 appeared first on OpenText Blogs.

article thumbnail

Restaurant Chain Landry's Investigates Malware Incident

Data Breach Today

Houston-Based Firm Describes How Card Data May Have Been Breached Landry's Inc., a Houston-based company that owns and operates over 600 restaurants, hotels, casinos and other entertainment establishments in the U.S. and around the world, is investigating an apparent data breach after its security team found malware within a system.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2020 Cybersecurity Trends to Watch

Threatpost

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

article thumbnail

[Podcast] Intelligent Information Management - The Coming of Age

AIIM

2019 was a great year. We said goodbye to some of our favorite tv shows like Game of Thrones and The Big Bang Theory, cheered as the US Women’s Soccer team won the world cup, and who could forget (insert YOUR favorite 2019 memory here). But, here at AIIM, 2019 was more than just great memories, it’s been especially crucial for the practice of Intelligent Information Management.

article thumbnail

Government exposes addresses of new year honours recipients

The Guardian Data Protection

Cabinet Office apologises after details of more than 1,000 people posted online in error Elton John wins highest accolade in new year honours list More than 1,000 celebrities, government employees and politicians who received honours in the new year list have had their home and work addresses posted on a government website, the Guardian can reveal. The accidental disclosure of a tranche of personal details of those being celebrated for their service to British society is likely to be considered

article thumbnail

Smart Home Device Maker Wyze Exposed Camera Database

Data Breach Today

Technical Data Plus Emails Made It Possible to Link Cameras to People Seattle-based smart home device maker Wyze says an error by a developer exposed a database to the internet over a three-week period earlier this month. The data included customer emails, nicknames of online cameras, WiFi SSIDs, device information and Alexa tokens.

IT 204
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A new trojan Lampion targets Portugal

Security Affairs

New trojan called ‘Lampion’ has spread using template emails from the Portuguese Government Finance & Tax during the last days of 2019. Last days of 2019 were the perfect time to spread phishing campaigns using email templates based on the Portuguese Government Finance & Tax. SI-LAB noted that Portuguese users were targeted with malscam messages that reported issues related to a debt of the year 2018.

article thumbnail

The Best Training for Records Managers

AIIM

In a couple of recent blog posts, we’ve talked about important skills every modern records manager must have right now and the best certifications for records managers. This leads to a logical question – how does a records manager get there? Where do you start? In my role as Director of Professional Development for AIIM, I connect with countless professionals at this same point along their career path where they are asking these same questions.

article thumbnail

The United Kingdom Leaks Home Addresses of Prominent Brits

Adam Levin

2020 seems to be getting off to an inauspicious start with the compromise of the home addresses of prominent UK citizens–many of them in lines of work that could make them targets for crime. The UK Cabinet Office issued an apology after a data leak that involved the exact addresses (including house and apartment numbers) of more than 1,000 New Year Honours recipients.

article thumbnail

Microsoft Removes 50 Domains Tied to North Korean Hackers

Data Breach Today

Company Says Malicious Sites Used For Spear-Phishing and Malware Attacks Microsoft has taken control of 50 domains that the company says were used by a hacking group with ties to North Korea. The attackers used these sites to launch spear-phishing attacks against specific victims and spread malware.

Phishing 200
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

TikTok Banned By U.S. Army Over China Security Concerns

Threatpost

The U.S. Army this week has banned TikTok from government-owned devices as scrutiny over the platform's relationship with China grows.

Security 107
article thumbnail

Efficient Paper Filing – Centralization Part 3: Filing Controls

TAB OnRecord

Today’s post is the last installment in our three-part series on centralizing physical records and creating a “paperlite” environment. In the last two posts we covered off file consolidation, conversion and space planning. This week we focus on filing controls, which are critical to the success of a centralized records storage system. Read More. The post Efficient Paper Filing – Centralization Part 3: Filing Controls appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 78
article thumbnail

Crooks use Star Wars saga as bait in Phishing and malware attacks

Security Affairs

Crooks are exploiting the popularity of the Star Wars saga to monetize their efforts, experts warn of online streaming sites delivering malware. Cybercriminals leverage popular movies like Star Wars to lure users into downloading malware to watch exclusive scenes or the full movie. Experts at Kaspersky have analyzed some threats that exploit the new Star Wars movie The Rise of Skywalker as bait for unaware users. .

article thumbnail

Ambulance Company Slapped With HIPAA Fine

Data Breach Today

Regulator Says Case Involved 'Longstanding Compliance Issues' Federal regulators have smacked a Georgia-based ambulance company with a financial settlement and corrective action plan in a case involving "longstanding" HIPAA compliance issues. How big was the fine, and what factors precipitated it?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How the US Prepares Its Embassies for Potential Attacks

WIRED Threat Level

In addition to securing physical structures, the Diplomatic Security Service runs simulations of protests in a model city in Virginia.

IT 95
article thumbnail

Call for inquiry into government leak of honours list addresses

The Guardian Data Protection

Publication of recipients’ details described as ‘most serious’ data laws breach Politicians have called for an inquiry into how more than 1,000 prominent figures who are to receive honours had their home and work addresses posted on a government website. Personal details of those on the new year honours list – including more than a dozen MoD employees and senior counter-terrorism officers – were published in a downloadable list at 10.30pm on Friday.

article thumbnail

2019 end-of-year review part 2: July to December

IT Governance

Welcome to the second part of our round-up of 2019’s information security stories. You can read the first part here >> July. The second half of the year began with major data privacy news: the UK’s data protection authority, the ICO (Information Commissioner’s Office), announced its intention to fine British Airways and Marriott International a combined £282.6 million for breaching the GDPR (General Data Protection Regulation).

article thumbnail

US Coast Guard Warns Over Ryuk Ransomware Attacks

Data Breach Today

Incident That Targeted Maritime Facility Traced to Phishing Email The U.S. Coast Guard issued a security alert this month after a ransomware attack took down the IT network of an unnamed maritime facility. Investigators believe that the incident involved the Ryuk ransomware strain and started with a phishing email.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Irish National Cyber Security Strategy warns of ?attacks on Irish data centres

Security Affairs

The Irish government has published its National Cyber Security Strategy ?, it is an update of the country’s first Strategy which was published in 2015. The 2019 National Cyber Security Strategy aims to allow Ireland to continue to safely enjoy the benefits of the digital revolution and play a full part in shaping the future of the Internet. The report warns the national economy and the confidence in the State would be undermined by a major cyber attack on one of the numerous data centers t

article thumbnail

Ransomware Attack Topples Telemarketing Firm, Leaving Hundreds Jobless

Threatpost

Days before Christmas, employees found out that The Heritage Company had been hit by a ransomware attack and was "temporarily suspending operations.".

article thumbnail

Oregon Requires Vendors to Report Data Breaches

Data Matters

While much of the New Year attention has been focused on California due to the effective date of the California Consumer Privacy Act , a new Oregon law also went into effect on January 1, 2020 complicating compliance with data breach obligations. The law is unique among state data breach notification laws in that it imposes a direct obligation on vendors to provide regulatory notice to the state.