Sat.Feb 29, 2020 - Fri.Mar 06, 2020

Securing the Modern Workplace

Data Breach Today

David Wagner of Zix on Rising to the Challenges of Cloud Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix

Cloud 135

Walgreens Mobile App Leaks Prescription Data


A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses. Mobile Security Vulnerabilities data breach data leak healthcare security HIPAA mobile app mobile app security SMS security Walgreens

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Managing the Risks Posed By APIs

Data Breach Today

Shreyans Mehta of Cequence Security on the API Security Landscape APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security

Risk 134

HIMSS20 Cancelled Due to Coronavirus

Data Breach Today

Organizers Pull Plug on Event for First Time in Nearly 60 Years Amid Global Spread of Covid-19 For the first time since the event was launched 58 years ago, organizers on Thursday cancelled the Healthcare Information and Management Systems Society Conference, due to the quickly evolving global coronavirus spread


Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Deception Technology in 2020

Data Breach Today

Attivo's CTO and CMO Share Insight on Industry Trends Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks

More Trending

Steve Katz on the CISO Role in 2020

Data Breach Today

World's First CISO Shares Insight to Guide Next Generation of Leaders Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders

SurfingAttack – hacking phones via ultrasonic waves

Security Affairs

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice commands encoded in ultrasonic waves silently activate a mobile phone’s digital assistant. The technique could be used to do several actions such as making phone calls or reading text messages.

Paper 86

Time and cost savings for Marketing, Finance, and Sales with Jamf

Jamf on EdTech

The second in a three-part series, we show the many tasks which Jamf solutions can simplify, speed up, automate and even eliminate: for all of your departments. This week: Finance, Marketing and Sales

Sales 51

What does the Data Office do? Inside Collibra’s Data Office


The data is in, and we all get it: It’s a strategic asset. It’s as vital as Finance managing the budget, or Human Resources recruiting talent. We’re almost at the point where data can be officially listed, even quantified, on the balance sheet as a competitive advantage. . The perception, if not the reality, is now so pervasive that it’s almost a cliché.

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

The role of IT and HR in digital transformation


Businesses should not overlook the importance of the employee's digital experience when engaging in a digital transformation

Women on the rise in Data Science

IBM Big Data Hub

IBM Data Science and AI Elite team members Mehrnoosh Vahdat and Rachael Dottle were just one month into their IBM careers when they received their first assignment last July. . The project jettisoned them into the heart of Africa, where their banking client was looking to surface new business opportunities across the subcontinent. Their mission was to generate a proof of concept designed to enhance the value of data science and inject the results into workflows for business users and clients.

Open Regulatory Consultations in the UK and the EU – Have Your Say

HL Chronicle of Data Protection

As highlighted by our new Privacy 2040 initiative, there have never been more opportunities to shape the existing and future privacy and cybersecurity legal framework. Consultations on draft guidance and surveys of various stakeholders are an important step in the production of new rules and materials, and the UK Information Commissioner’s Office (ICO) and the European Data Protection Board (EDPB) currently have a number of open consultations.

ICO Fines Scottish Company Maximum Amount for Automated Calls

Hunton Privacy

On March 2, 2020, the UK Information Commissioner’s Office (“ICO”) fined CRDNN Limited, a lead generation company, £500,000—the maximum amount available for a breach of the Electronic Communications Regulations (“PECR”). The fine was imposed after CRDNN carried out over 193 million unsolicited automated direct marketing calls relating to window scrappage, window and conservatory sales, boiler sales, and debt management between June and October 2018.

Sales 49

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Financial institutions can gain new AI model risk management capabilities with IBM Watson OpenScale

IBM Big Data Hub

Many financial institutions are rapidly developing and adopting AI models. They’re using the models to achieve new competitive advantages such as being able to make faster and more successful underwriting decisions. However, AI models introduce new risks

Risk 52

DoppelPaymer Ransomware Slams Supplier to Boeing and Tesla

Data Breach Today

Crypto-Locking Malware Gang Dumps Confidential Data Stolen From Visser Precision Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data, and threatening to leak more unless the victim pays a ransom

The Case for Limiting Your Browser Extensions

Krebs on Security

Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code. An investigation determined it was injected by a browser extension installed on the computer of a Blue Shield employee who’d edited the Web site in the past month.

NEW TECH: Juicing up SOAR — SIRP inserts risk-based analysis into network defense playbooks

The Last Watchdog

Security information and event management (SIEM) is evolving and integrating with security orchestration, automation, and response (SOAR) to add real value in the cybersecurity space. Related : How SOAR Is Helping to Address the Cybersecurity Skills Gap SIEM is useful for detecting potential security incidents and triggering alerts, but the addition of a SOAR solution brings these alerts to another level by triaging the data and adopting remediation measures where required.

Risk 150

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

The EARN IT Act Is a Sneak Attack on Encryption

WIRED Threat Level

The crypto wars are back in full swing. . Security Security / Security News

Walgreens Mobile App Exposed Health-Related Messages

Data Breach Today

For Six Days, App May Have Shown Private Messages to Other Users Walgreens' mobile app inadvertently disclosed personal messages to other customers due to an internal application error, revealing some health-related information. The company did not say how many people were affected


French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. An individual thought to be involved has earned accolades from the likes of Apple , Dell , and Microsoft for helping to find and fix security vulnerabilities in their products.

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.

Cloud 141

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Let's Encrypt Vulnerability

Schneier on Security

The BBC is reporting a vulnerability in the Let's Encrypt certificate service: In a notification email to its clients, the organisation said: "We recently discovered a bug in the Let's Encrypt certificate authority code. Unfortunately, this means we need to revoke the certificates that were affected by this bug, which includes one or more of your certificates. To avoid disruption, you'll need to renew and replace your affected certificate(s) by Wednesday, March 4, 2020.

The 'Human Element' in Privacy

Data Breach Today

Gabriel Gumbs of Spirion on Privacy Regulations and Data Classification The RSA 2020 theme was "The Human Element." Gabriel Gumbs of Spirion describes what this means in the era of privacy regulations

New Ransomware Variant Developed Entirely as Shellcode

Dark Reading

PwndLocker is harder to detect than other crypto-malware, Crypsis Group says

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

The Last Watchdog

Wider use of Internet of Things systems that can make daily living safer, healthier and more convenient is on the immediate horizon. However, to fully capture the benefits of an IoT-centric economy, a cauldron of privacy and security concerns must first be quelled. Related : The promise and pitfalls of IoT At the technology level, two fundamental things must get accomplished.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Hackers gained access to T-Mobile customers and employee personal info

Security Affairs

New problems for the wireless carrier T-Mobile that disclosed a data breach that exposed some of the customers’ personal information. The wireless carrier T-Mobile was victims of a sophisticated cyber attack that targeted its email vendor. A data breach notification published by the telecommunications giant on its website revealed that the security breach impacted both employees and customers.

Redefining Security Analytics

Data Breach Today

Chronicle's Anton Chuvakin on How to Fill the Gaps for Analysts There are glaring holes in how enterprises currently tackle security analytics, and by redefining the approach, the analyst's role can be transformed. Dr. Anton Chuvakin of Chronicle explains how

7 Cloud Attack Techniques You Should Worry About

Dark Reading

Security pros detail the common and concerning ways attackers target enterprise cloud environments

Cloud 87