Sat.Jun 01, 2019 - Fri.Jun 07, 2019

Migrating to the hybrid cloud with an eye on modernization

CGI

Migrating to the hybrid cloud with an eye on modernization. pooja.cs@cgi.com. Thu, 06/06/2019 - 23:17. Any shift to a new IT architecture can be difficult.

Game of Threats: What the Cybersecurity Industry Can Take Away from Game of Thrones

Thales eSecurity

Warning: Spoilers Ahead. As Game of Thrones fans sift through emotional ashes left behind after the final fiery episode, conjecture and lamentation over what happened and why has dominated pop culture conversations.

8 Takeaways: European Data Protection Summit

Data Breach Today

As GDPR Celebrates Its First Birthday, Privacy Experts Meet in London to Review One year after the EU's General Data Protection Regulation went into full effect, data protection experts gathered at the European Data Protection Summit in London to review the state of privacy - not just in the U.K.

GDPR 248

LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach

Krebs on Security

Medical testing giant LabCorp. said today personal and financial data on some 7.7 million consumers were exposed by a breach at a third-party billing collections firm.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

There’s oil in the state of Maryland – “cyber oil.” With the largest concentration of cybersecurity expertise –– the “oil” — in the world, Maryland is fast changing from the Old Line State into “Cybersecurity Valley.”

More Trending

7.7 Million LabCorp Patients Added to AMCA Breach Tally

Data Breach Today

Earlier, Quest Diagnostics Reported Nearly 12 Million Affected by Same Incident How big will the American Medical Collections Agency data breach get? LabCorp has now revealed that data on 7.7 million of the patients it serves was potentially compromised in the breach.

Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware

Krebs on Security

For almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as “ Robbinhood.”

Fort Worth IT Professionals Fired for Reporting Cybersecurity Issues: What We Know

Security Affairs

In October 2017, the city of Fort Worth, Texas became the target of a phishing scam. Their accounts payable department received an email that appeared to be from Imperial Construction, a company that was doing business with the city at the time. The sender of the email, later identified as Gbenga A.

5 ways to detect a phishing email – with examples

IT Governance

Phishing is one of the most longstanding and dangerous methods of cyber crime. It uses deceptive messages to trick victims into clicking bogus links, downloading malicious attachments or sending sensitive information. Despite what people think they know about phishing, they consistently fall victim.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

GoldBrute Botnet Brute-Force Attacking 1.5M RDP Servers

Data Breach Today

Botnet Scanning Internet for Vulnerable Windows Machines A new botnet called GoldBrute is actively scanning the internet and using brute-force methods to attack 1.5 million Windows machines that have exposed Remote Desktop Protocol connections, according to research from Morphus Labs.

Groups 220

The Importance of Protecting Cybersecurity Whistleblowers

Schneier on Security

Interesting essay arguing that we need better legislation to protect cybersecurity whistleblowers. Congress should act to protect cybersecurity whistleblowers because information security has never been so important, or so challenging.

Expert developed a MetaSploit module for the BlueKeep flaw

Security Affairs

A security expert has developed a Metasploit module to exploit the critical BlueKeep vulnerability and get remote code execution. The security researcher Z??osum0x0 osum0x0 has developed a module for the popular Metasploit penetration testing framework to exploit the critical BlueKeep flaw.

Millions of data workers face inefficiencies as data complexity grows

Information Management Resources

Approximately 54 million data workers around the world face common challenges associated with the complexity, diversity and scale of their organizations’ data, and nearly half of their work time is wasted, says a new study. Analytics Data management Data strategy

Study 148

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

$74 Million Settlement of Premera Breach Lawsuits Proposed

Data Breach Today

Much @Stake: The Band of Hackers That Defined an Era

WIRED Threat Level

Today's cybersecurity superstars share a common thread—one that leads back to early hacking group Cult of the Dead Cow. Security Security / Security News

ESET analyzes Turla APT’s usage of weaponized PowerShell

Security Affairs

Turla, the Russia-linked cyberespionage group, is weaponizing PowerShell scripts and is using them in attacks against EU diplomats.

GDPR One Year Anniversary: What We’ve Learned So Far

Thales eSecurity

GDPR 96

Hospital to Pay $250,000 After Alleged False HITECH Claims

Data Breach Today

Election Security Is Still Hurting at Every Level

WIRED Threat Level

With the 2020 election fast approaching, too many problems from 2016 persist. Security Security / National Security

ProtonMail denies that it spies on users for government agencies

Security Affairs

The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement.

Chinese Military Wants to Develop Custom OS

Schneier on Security

Quest Diagnostics: Data on 12 Million Patients Exposed

Data Breach Today

Breach at Collections Agency Exposed Healthcare and Financial Information A data breach at American Medical Collection Agency has affected nearly 12 million patients who had lab tests performed by Quest Diagnostics, exposing a wealth of information, including Social Security numbers

Democratizing Data and the Rise of the Citizen Analyst

erwin

Data innovation is flourishing, driven by the confluence of exploding data production, a lowered barrier to entry for big data, as well as advanced analytics, artificial intelligence and machine learning.

Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

Security Affairs

A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan to scan for Docker hosts with exposed APIs. Threat actors are using the popular Shodan search engine to find Docker hosts and abuse them in a crypojacking campaign.

The Cost of Cybercrime

Schneier on Security

Really interesting paper calculating the worldwide cost of cybercrime: Abstract: In 2012 we presented the first systematic study of the costs of cybercrime. In this paper,we report what has changed in the seven years since.

Paper 94

The Fight Against Malicious Bots

Data Breach Today

Cequence Security's Carl Gustas on Why These Bots Are a Growing Threat Organizations and their applications are under attack from automated bots and bad actors. And many of these attacks are undetectable by conventional security technologies. How can organizations detect and prevent this activity?

Revealed: 2016 Russian Troll Activity More Lucrative and Widespread

Adam Levin

Online activity by Russian trolls in the lead-up to the 2016 election was significantly more widespread than initially estimated, cybersecurity firm Symantec concluded. Symantec announced their findings following the analysis of a dataset released by Twitter in October 2018.

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security Affairs

A new version of the popular Tor Browser was released by the Tor Project, it is Tor Browser 8.5.1 for Windows, Mac, Linux, and Android. The Tor Project has released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android, the new version of the popular anonymizing browser.

IT 93

Lessons Learned Trying to Secure Congressional Campaigns

Schneier on Security

Really interesting first-hand experience from Maciej Ceg?owski. owski. computersecurity riskassessment risks securityawareness securityeducation socialmedia twofactorauthentication usability voting

Apple Emphasizes Privacy With Single Sign-On Feature

Data Breach Today

Sign in With Apple' Seeks to Halt Tracking Apple will introduce a feature in its new iOS 13 operating system later this year that allows the use of Apple credentials to log into other services.

Integrating Apps for Actionable Insight

OpenText Information Management

In a recent blog, I outlined how data is the oil of the business engine, and when fully integrated, it can deliver powerful insight. In a second blog I discussed how to unleash the power of combined data with a collaborative approach.

Blog 85