Sat.Jul 13, 2019 - Fri.Jul 19, 2019

Digital Transformation: Lessons Learned from the World Cup

Micro Focus

Over the past several weeks, the world has been watching the FIFA Women’s World Cup – a global soccer (or football if you’re not from the US) tournament, which highlighted some of the best athletes in the world and culminated in a landmark win for the US team.

Palantir Manual Shows How Law Enforcement Tracks Families

WIRED Threat Level

An Apple Watch bug, a hackable hair straightener, and more security news this week. Security Security / Cyberattacks and Hacks

Data governance in the age of AI: Beyond the basics

Information Management Resources

Ensuring the quality of data becomes increasingly important so that organizations don’t wind up making bigger mistakes. Data governance Data management Data strategy

Security Flaw Exposed Valid Airline Boarding Passes

Data Breach Today

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack

Krebs on Security

Cloud hosting provider iNSYNQ says it is trying to recover from a ransomware attack that shut down its network and has left customers unable to access their accounting data for the past three days.

More Trending

Understanding the role of governance in data lakes and warehouses

Information Management Resources

While they have innate differences, and serve organizations differently, there is a universal thread that runs through both, without which, would render them useless. Data lakes Data warehouses Data governance

Payment Fraud: Criminals Enroll Stolen Cards on Apple Pay

Data Breach Today

Fraud Fighters Also See Spikes in ATM Malware, Card Enrollment as a Service Fraudsters continue to get new tricks up their sleeves.


Party Like a Russian, Carder’s Edition

Krebs on Security

“It takes a certain kind of man with a certain reputation.

Video 204

GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

The Last Watchdog

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that a cyber-attack costs your organization, you would be wrong. In fact, a recent academic analysis identified 57 specific individual negative factors that result from a cyber-attack against a business. Here are six ways, worth considering, that a attack can affect your organization.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

4 top predictions for the growth of virtual reality

Information Management Resources

According to Statista, VR is set to generate upwards of $20 billion by 2020. As the market expands and as the technology advances, will see even greater innovations for VR. Virtual reality Augmented reality Data management

Phishing Scheme Targets Amex Cardholders

Data Breach Today

Researchers Say Campaign Uses Email Hyperlink Splits to Evade URL Filters Researchers have uncovered a new type of phishing campaign that is targeting American Express card users.

Is ‘REvil’ the New GandCrab Ransomware?

Krebs on Security

The cybercriminals behind the GandCrab ransomware-as-a-service (RaaS) offering recently announced they were closing up shop and retiring after having allegedly earned more than $2 billion in extortion payments from victims.

Hackers Made an App That Kills to Prove a Point

WIRED Threat Level

Medtronic and the FDA left an insulin pump with a potentially deadly vulnerability on the market—until researchers who found the flaw showed how bad it could be. Security Security / Cyberattacks and Hacks

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Authentication and the Have I Been Pwned API

Troy Hunt

The very first feature I added to Have I Been Pwned after I launched it back in December 2013 was the public API.

Despite BlueKeep Warnings, Many Organizations Fail to Patch

Data Breach Today

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

Experts spotted a rare Linux Desktop spyware dubbed EvilGnome

Security Affairs

Experts at Intezer discovered a new backdoor, dubbed EvilGnome, that is targeting Linux systems for cyber espionage purpose. Intezer spotted a new piece of Linux malware dubbed EvilGnome because it disguises as a Gnome extension.

Palantir's Surveillance Service for Law Enforcement

Schneier on Security

Motherboard got its hands on Palantir's Gotham user's manual, which is used by the police to get information on people: The Palantir user guide shows that police can start with almost no information about a person of interest and instantly know extremely intimate details about their lives.

FOIA 102

Phishing Campaign Tied to Amazon Prime Day

Data Breach Today

Fraudsters Use Phishing Kit Called 16Shop, McAfee Reports In the run-up to Amazon Prime Day, some of the company's customers were being targeted by a phishing kit called 16Shop, according to McAfee researchers. The campaign is similar to an earlier attack that focused on Apple users

For digital transformation success, focus on customers and employees

Information Management Resources

Although it promises new ways to innovate and stay ahead of the competition, misplaced investments that lack a strong focus on people (customers and employees) often cause digital transformation efforts to fizzle. Digital transformation Data management Data strategy

Magecart group infected over 17,000 domains via unprotected AWS S3 Buckets

Security Affairs

The Magecart continues to target websites worldwide, it infected over 17,000 domains by targeting improperly secured Amazon S3 buckets. .

Groups 103

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

All those services you signed up for but forgot about? They're a security risk. Here's how to get rid of them. Security Security / Security Advice

Risk 98

Ransomware: As GandCrab Retires, Sodinokibi Rises

Data Breach Today

Ransom Payments to Crypto-Locking Malware Extortionists Are Surging With the GandCrab ransomware-as-service gang promising to retire - and free decryptors now aiding victims - rival Sodinokibi has already stepped into the void, security experts warn.

Digital technologies and the future of geospatial data

Information Management Resources

Geospatial data makes it possible to use point-to-point mapping apps to reach unfamiliar destinations, track incoming flights before heading to the airport or even check weather forecasts. Geospatial data Data types Data management

Data 93

Former NSA contractor sentenced to 9 years for stealing classified data

Security Affairs

The former NSA contractor who pled guilty to stealing over 50TB of data from the Agency, was sentenced to nine years in prison.

U.S. Healthcare Industry Needs a Shot in the Arm When it Comes to Data Protection: 70% experienced a breach; Less than 38% are encrypting even as threats increase

Thales eSecurity

If the vast majority of the people in your office knew they would contract the flu today, it’s safe to say most chairs would remain empty. Anyone who actually came to work would avoid others, sanitize drawer handles, wash their hands, and/or wear a mask.

Patient Record Snooping Incident Leads to GDPR Fine

Data Breach Today

GDPR 215

PayPal-backed blockchain aims to help banks verify digital IDs

Information Management Resources

A new project backed by the government of Luxembourg could ultimately be influential in the U.S., where banks have been slow to develop a shared platform for digital identities. Digital ID Identity verification Blockchain Distributed ledger technology KYC AML PayPal

Poland and Lithuania fear that data collected via FaceApp could be misused

Security Affairs

Poland and Lithuania are probing the potential privacy and security risks of using a Russian-made app FaceApp. Millions of people recently downloaded the FaceApp app and are taking part in the “ #FaceApp Challenge ” to show friends how they can look like when they will be old and grey.

How to make sure your cyber insurance policy pays out

IT Governance

Cyber insurance is big business these days. With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately.

BEC Scams Cost U.S. Companies $300 Million Per Month: Study

Data Breach Today

Treasury Department Says an Average of 1,100 Businesses Scammed Each Month Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department.

Study 215