Sat.Jun 01, 2019 - Fri.Jun 07, 2019

Migrating to the hybrid cloud with an eye on modernization


Migrating to the hybrid cloud with an eye on modernization. Thu, 06/06/2019 - 23:17. Any shift to a new IT architecture can be difficult.

Game of Threats: What the Cybersecurity Industry Can Take Away from Game of Thrones

Thales eSecurity

Warning: Spoilers Ahead. As Game of Thrones fans sift through emotional ashes left behind after the final fiery episode, conjecture and lamentation over what happened and why has dominated pop culture conversations.

8 Takeaways: European Data Protection Summit

Data Breach Today

As GDPR Celebrates Its First Birthday, Privacy Experts Meet in London to Review One year after the EU's General Data Protection Regulation went into full effect, data protection experts gathered at the European Data Protection Summit in London to review the state of privacy - not just in the U.K.

GDPR 255

LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach

Krebs on Security

Medical testing giant LabCorp. said today personal and financial data on some 7.7 million consumers were exposed by a breach at a third-party billing collections firm.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Millions of data workers face inefficiencies as data complexity grows

Information Management Resources

Approximately 54 million data workers around the world face common challenges associated with the complexity, diversity and scale of their organizations’ data, and nearly half of their work time is wasted, says a new study. Analytics Data management Data strategy

Study 142

More Trending

7.7 Million LabCorp Patients Added to AMCA Breach Tally

Data Breach Today

Earlier, Quest Diagnostics Reported Nearly 12 Million Affected by Same Incident How big will the American Medical Collections Agency data breach get? LabCorp has now revealed that data on 7.7 million of the patients it serves was potentially compromised in the breach.

Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware

Krebs on Security

For almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as “ Robbinhood.”

De-biasing language to achieve more balanced analytics

Information Management Resources

De-biasing might even make bias more dangerous by hiding it, rather than leaving it out in the open. The toughest problems are often the ones you only think you’ve solved. Artificial intelligence Machine learning Data modeling

ESET analyzes Turla APT’s usage of weaponized PowerShell

Security Affairs

Turla, the Russia-linked cyberespionage group, is weaponizing PowerShell scripts and is using them in attacks against EU diplomats.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

GoldBrute Botnet Brute-Force Attacking 1.5M RDP Servers

Data Breach Today

Botnet Scanning Internet for Vulnerable Windows Machines A new botnet called GoldBrute is actively scanning the internet and using brute-force methods to attack 1.5 million Windows machines that have exposed Remote Desktop Protocol connections, according to research from Morphus Labs.

Groups 226

5 ways to detect a phishing email – with examples

IT Governance

Phishing is one of the most longstanding and dangerous methods of cyber crime. It uses deceptive messages to trick victims into clicking bogus links, downloading malicious attachments or sending sensitive information. Despite what people think they know about phishing, they consistently fall victim.

Advanced analytics, AI critical to many digital transformation efforts

Information Management Resources

As organizations look to manage and secure data in a connected ecosystem, the key concerns for IT decision makers are cyber security, the ability to upgrade infrastructure and optimizing operations. Data security Cyber security Data strategy Analytics

Fort Worth IT Professionals Fired for Reporting Cybersecurity Issues: What We Know

Security Affairs

In October 2017, the city of Fort Worth, Texas became the target of a phishing scam. Their accounts payable department received an email that appeared to be from Imperial Construction, a company that was doing business with the city at the time. The sender of the email, later identified as Gbenga A.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

$74 Million Settlement of Premera Breach Lawsuits Proposed

Data Breach Today

Much @Stake: The Band of Hackers That Defined an Era

WIRED Threat Level

Today's cybersecurity superstars share a common thread—one that leads back to early hacking group Cult of the Dead Cow. Security Security / Security News

Social media analytics takes on critical role in engaging, keeping customers

Information Management Resources

The ongoing focus on engaging existing customers and attracting new ones will drive demand for social media analytics over the coming years. Social media Customer data Customer experience Data strategy

Expert developed a MetaSploit module for the BlueKeep flaw

Security Affairs

A security expert has developed a Metasploit module to exploit the critical BlueKeep vulnerability and get remote code execution. The security researcher Z??osum0x0 osum0x0 has developed a module for the popular Metasploit penetration testing framework to exploit the critical BlueKeep flaw.

Quest Diagnostics: Data on 12 Million Patients Exposed

Data Breach Today

Breach at Collections Agency Exposed Healthcare and Financial Information A data breach at American Medical Collection Agency has affected nearly 12 million patients who had lab tests performed by Quest Diagnostics, exposing a wealth of information, including Social Security numbers

iOS Shortcut for Recording the Police

Schneier on Security

" Hey Siri; I'm getting pulled over " can be a shortcut: Once the shortcut is installed and configured , you just have to say, for example, "Hey Siri, I'm getting pulled over."

Video 105

6 steps to establishing a digital workplace

Information Management Resources

Businesses intent on digital transformation are gaining that advantage by adopting a digital workplace to build cutting-edge teams. Digital transformation Data management Employee engagement Data strategy

GDPR One Year Anniversary: What We’ve Learned So Far

Thales eSecurity

GDPR 104

Hospital to Pay $250,000 After Alleged False HITECH Claims

Data Breach Today

ProtonMail denies that it spies on users for government agencies

Security Affairs

The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement.

5 requirements for success with DataOps strategies

Information Management Resources

Similar to DevOps, DataOps is an emerging set of practices, processes and technologies for building an enhancing data and analytics pipelines to better meet the needs of the business. Data strategy Data management Data discovery

Election Security Is Still Hurting at Every Level

WIRED Threat Level

With the 2020 election fast approaching, too many problems from 2016 persist. Security Security / National Security

The Fight Against Malicious Bots

Data Breach Today

Cequence Security's Carl Gustas on Why These Bots Are a Growing Threat Organizations and their applications are under attack from automated bots and bad actors. And many of these attacks are undetectable by conventional security technologies. How can organizations detect and prevent this activity?

The Importance of Protecting Cybersecurity Whistleblowers

Schneier on Security

Interesting essay arguing that we need better legislation to protect cybersecurity whistleblowers. Congress should act to protect cybersecurity whistleblowers because information security has never been so important, or so challenging.

Surviving and thriving in year three as a chief data officer

Information Management Resources

The bad news is that everything that could possibly go wrong from a security, governance and risk perspective is your responsibility. If you do a perfect job, then no one on the management team ever hears your name. Chief Data Officer Career planning CDOs

Risk 101

Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

Security Affairs

A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan to scan for Docker hosts with exposed APIs. Threat actors are using the popular Shodan search engine to find Docker hosts and abuse them in a crypojacking campaign.

Mining 100

Apple Emphasizes Privacy With Single Sign-On Feature

Data Breach Today

Sign in With Apple' Seeks to Halt Tracking Apple will introduce a feature in its new iOS 13 operating system later this year that allows the use of Apple credentials to log into other services.

Revealed: 2016 Russian Troll Activity More Lucrative and Widespread

Adam Levin

Online activity by Russian trolls in the lead-up to the 2016 election was significantly more widespread than initially estimated, cybersecurity firm Symantec concluded. Symantec announced their findings following the analysis of a dataset released by Twitter in October 2018.