Sat.Mar 07, 2020 - Fri.Mar 13, 2020

How COVID-19 will change how we work FOREVER

OpenText Information Management

Global supply chains, especially in the manufacturing sector have experienced many different forms of disruption over the years – from earthquakes and tsunamis through to social unrest and even piracy in the Indian Ocean.

3 Tips to Stay Secure When You Lose an Employee

Dark Reading

Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Cutting Edge of Behavioral Biometrics

Data Breach Today

SecuredTouch CEO Alasdair Rambaud on 2020 Innovations Behavioral biometrics is seeing wide adoption and is helping organizations proactively fight fraud, says Alasdair Rambaud, CEO at SecuredTouch. who describes the latest innovations

252
252

No, a Border Wall Won't Stop Coronavirus

WIRED Threat Level

Trump's latest pitch for the wall ignores basic science—and might only make things worse. Security Security / National Security

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

What You Need to Know About E-Skimming

Adam Levin

While ransomware and leaky or completely unprotected databases dominated headlines in 2019, e-skimmers quietly made a killing.

More Trending

Don’t Be Blindsided by Regulatory Compliance: The Problem With “Set It and Forget It”

Hanzo Learning Center

It’s 2020—where’s my flying car? For that matter, where’s my fully autonomous car? Elon Musk keeps promising it’s almost here. But if you’re hoping that your car will cheerfully schlep you to the office by the end of this year, get used to disappointment. Photo by Ciel Cheng on Unsplash.

Hanzo’s Response To COVID-19 And Commitment To Customers

Hanzo Learning Center

On January 30th, 2020, the International Health Regulations Emergency Committee of the World Health Organization (“WHO”) declared the outbreak of coronavirus, or COVID-19, a “public health emergency of international concern.”

52

Three Takeaways from Gartner’s Top 10 Cloud Myths for 2020

Adapture

Cloud trends continue to shift, and so do the cloud myths surrounding the industry.

Cloud 52

COVID-19 Will Accelerate the Shift to Digital

Reltio

As WHO declares COVID-19 a pandemic , this event is impacting our lives and the way of working in unprecedented ways. Are we ready for this new world? Are businesses prepared to tackle the change? .

Sales 70

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

The Ongoing Battle Over How ESI is Produced: eDiscovery Trends, Part Three

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars.

Live Coronavirus Map Used to Spread Malware

Krebs on Security

Cybercriminals constantly latch on to news items that captivate the public’s attention, but usually they do so by sensationalizing the topic or spreading misinformation about it.

PwndLocker: Free Decryptor Frees Crypto-Locked Data

Data Breach Today

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Related: The API attack vector expands Speed translates into innovation agility.

Cloud 190

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Microsoft accidentally reveals Wormable Win SMBv3 CVE-2020-0796 Flaw

Security Affairs

Today Microsoft accidentally leaked info about a new wormable vulnerability (CVE-2020-0796) in the Microsoft Server Message Block (SMB) protocol. Today Microsoft accidentally leaked info on a security update for a wormable vulnerability in the Microsoft Server Message Block (SMB) protocol.

Crafty Web Skimming Domain Spoofs “https”

Krebs on Security

Earlier today, KrebsOnSecurity alerted the 10th largest food distributor in the United States that one of its Web sites had been hacked and retrofitted with code that steals credit card and login data.

Windows Alert: Critical SMB_v3 Flaw Requires Workaround

Data Breach Today

Microsoft Recommends Emergency Disabling of SMBv3 Compression, Pending Patches Microsoft has confirmed that a serious flaw in Windows SMB_v3 exists that could be exploited by attackers to remotely seize control of vulnerable systems.

249
249

SHARED INTEL: Bogus Coronavirus email alerts underscore risk posed by weaponized email

The Last Watchdog

It comes as no surprise that top cyber crime rings immediately pounced on the Coronavirus outbreak to spread a potent strain of malware via malicious email and web links.

Risk 158

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Nation-state actors are exploiting CVE-2020-0688 Microsoft Exchange server flaw

Security Affairs

Multiple state-sponsored hacking groups are attempting to exploit a vulnerability recently addressed in Microsoft Exchange email servers.

FBI Arrests Alleged Owner of Deer.io, a Top Broker of Stolen Accounts

Krebs on Security

FBI officials last week arrested a Russian computer security researcher on suspicion of operating deer.io , a vast marketplace for buying and selling stolen account credentials for thousands of popular online services and stores. Kirill V. Firsov was arrested Mar.

Sales 208

Telehealth and Coronavirus: Privacy, Security Concerns

Data Breach Today

As Services Expand, What Factors Should Organizations Consider? To help deal with the coronavirus outbreak, healthcare providers are examining how to implement or expand the use of telehealth services to remotely evaluate and care for patients.

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

The Last Watchdog

Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last.

IoT 158

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Cookiethief, the Android malware that hijacks Facebook accounts

Security Affairs

Experts discovered an Android Trojan, dubbed Cookiethief , that is able to gain root access on infected devices and hijack Facebook accounts.

Microsoft Patch Tuesday, March 2020 Edition

Krebs on Security

Microsoft Corp. today released updates to plug more than 100 security holes in its various Windows operating systems and associated software. If you (ab)use Windows, please take a moment to read this post, backup your system(s), and patch your PCs.

Cybersecurity Sector Faces Reckoning After Coronavirus Hits

Data Breach Today

Wall Street Suffers Worst Loss in 12 Years; White House Floats Stimulus Package Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years.

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

The cybersecurity needs of small- and mid-sized businesses (SMBs) differ from those of large enterprises, but few solutions cater to them. A 2018 Cisco Cybersecurity Special Report found that 54 % of all cyber attacks cost the target company more than $0.5 million — damages that would crush most SMBs. However, smaller companies rarely have the IT talent, tools, or budget to prevent such attacks.

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Why CSP Isn't Enough to Stop Magecart-Like Attacks

Dark Reading

As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it

IT 112

U.S. Govt. Makes it Harder to Get.Gov Domains

Krebs on Security

The federal agency in charge of issuing.gov domain names is enacting new requirements for validating the identity of people requesting them.

IT 174

For Sale: Card Data From Online Stores Using Volusion

Data Breach Today

Gemini Advisory Finds Data on Dark Web From Compromised Store Checkout Platform Payment card data stolen last year when hackers compromised online stores that were using the Volusion checkout platform is now surfacing on dark web sites and forums, according to Gemini Advisory

Sales 222