Sat.Feb 29, 2020 - Fri.Mar 06, 2020

Securing the Modern Workplace

Data Breach Today

David Wagner of Zix on Rising to the Challenges of Cloud Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix

Cloud 181

Walgreens Mobile App Leaks Prescription Data


A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses. Mobile Security Vulnerabilities data breach data leak healthcare security HIPAA mobile app mobile app security SMS security Walgreens

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Managing the Risks Posed By APIs

Data Breach Today

Shreyans Mehta of Cequence Security on the API Security Landscape APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security

Risk 163

HIMSS20 Cancelled Due to Coronavirus

Data Breach Today

Organizers Pull Plug on Event for First Time in Nearly 60 Years Amid Global Spread of Covid-19 For the first time since the event was launched 58 years ago, organizers on Thursday cancelled the Healthcare Information and Management Systems Society Conference, due to the quickly evolving global coronavirus spread.


How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Deception Technology in 2020

Data Breach Today

Attivo's CTO and CMO Share Insight on Industry Trends Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks

More Trending

Steve Katz on the CISO Role in 2020

Data Breach Today

World's First CISO Shares Insight to Guide Next Generation of Leaders Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders

SurfingAttack – hacking phones via ultrasonic waves

Security Affairs

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice commands encoded in ultrasonic waves silently activate a mobile phone’s digital assistant.

Paper 79

Time and cost savings for Marketing, Finance, and Sales with Jamf


The second in a three-part series, we show the many tasks which Jamf solutions can simplify, speed up, automate and even eliminate: for all of your departments. This week: Finance, Marketing and Sales

Sales 61

What does the Data Office do? Inside Collibra’s Data Office


The data is in, and we all get it: It’s a strategic asset. It’s as vital as Finance managing the budget, or Human Resources recruiting talent. We’re almost at the point where data can be officially listed, even quantified, on the balance sheet as a competitive advantage. .

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

The role of IT and HR in digital transformation


Businesses should not overlook the importance of the employee's digital experience when engaging in a digital transformation

Women on the rise in Data Science

IBM Big Data Hub

IBM Data Science and AI Elite team members Mehrnoosh Vahdat and Rachael Dottle were just one month into their IBM careers when they received their first assignment last July. .

Open Regulatory Consultations in the UK and the EU – Have Your Say

HL Chronicle of Data Protection

As highlighted by our new Privacy 2040 initiative, there have never been more opportunities to shape the existing and future privacy and cybersecurity legal framework.

ICO Fines Scottish Company Maximum Amount for Automated Calls

Hunton Privacy

On March 2, 2020, the UK Information Commissioner’s Office (“ICO”) fined CRDNN Limited, a lead generation company, £500,000—the maximum amount available for a breach of the Electronic Communications Regulations (“PECR”).

Sales 61

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Financial institutions can gain new AI model risk management capabilities with IBM Watson OpenScale

IBM Big Data Hub

Many financial institutions are rapidly developing and adopting AI models. They’re using the models to achieve new competitive advantages such as being able to make faster and more successful underwriting decisions. However, AI models introduce new risks

Risk 59

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. The bad news: Visibility and governance take a huge hit.

The Case for Limiting Your Browser Extensions

Krebs on Security

Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code.

MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

The Last Watchdog

Is America’s working definition of “national security” too narrow for the digital age? Yes, observes retired Admiral Michael Rogers , who served as a top White House cybersecurity advisor under both Presidents Obama and Trump.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

New Ransomware Variant Developed Entirely as Shellcode

Dark Reading

PwndLocker is harder to detect than other crypto-malware, Crypsis Group says

Hot Topics in Cybersecurity Research

Data Breach Today

Wade Baker Talks Vulnerability Triage and Quantifying Risk Quantifying risk is a significant challenge in cybersecurity. Wade Baker of Cyentia Institute discusses recent research projects

French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned.

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.

Cloud 131

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Siemens Shares Incident Response Playbook for Energy Infrastructure

Dark Reading

The playbook simulates a cyberattack on the energy industry to educate regulators, utilities, and IT and OT security experts

Cyber Candid: Edna Conway and Wendy Nather Unplugged

Data Breach Today

Two Cyber Vets Double Click on Hot Topics of RSA Conference Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studio

Cloud 194

More on Crypto AG

Schneier on Security

One follow-on to the story of Crypto AG being owned by the CIA: this interview with a Washington Post reporter.

NEW TECH: Juicing up SOAR — SIRP inserts risk-based analysis into network defense playbooks

The Last Watchdog

Security information and event management (SIEM) is evolving and integrating with security orchestration, automation, and response (SOAR) to add real value in the cybersecurity space. Related : How SOAR Is Helping to Address the Cybersecurity Skills Gap SIEM is useful for detecting potential security incidents and triggering alerts, but the addition of a SOAR solution brings these alerts to another level by triaging the data and adopting remediation measures where required.

Risk 116

Enhancing Pwned Passwords Privacy with Padding

Troy Hunt

Since launching version 2 of Pwned Passwords with the k-anonymity model just over 2 years ago now, the thing has really gone nuts (read that blog post for background otherwise nothing from here on will make much sense).

Big HIPAA Fine for Solo Doctor Practice

Data Breach Today

HHS OCR Cites Major Security Shortcomings A gastroenterologist has been smacked with a $100,000 HIPAA settlement after federal investigators found the physician's practice had never conducted a risk analysis

Risk 196

The North Korean Kimsuky APT threatens South Korea evolving its TTPs

Security Affairs

Cybaze-Yoroi ZLab analyzed a new implant employed by a North Korea-linked APT group, tracked as Kimsuky, in attacks on South Korea. I ntroduction. Recently we have observed a significant increase in state-sponsored operations carried out by threat actors worldwide.

IT 100

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

The Last Watchdog

Wider use of Internet of Things systems that can make daily living safer, healthier and more convenient is on the immediate horizon. However, to fully capture the benefits of an IoT-centric economy, a cauldron of privacy and security concerns must first be quelled. Related : The promise and pitfalls of IoT At the technology level, two fundamental things must get accomplished.