Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst

Another example of email misuse

IT Governance

Another week, another example of an email using the Cc (carbon copy) field instead of the Bcc (blind carbon copy) field. This time, it was West Ham United Football Club. . The email was sent to a group of supporters regarding ticket allocations for an away football match. .

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps.

An Example of Deterrence in Cyberspace

Schneier on Security

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for this.

GDPR: lawful bases for processing, with examples

IT Governance

For example, when you process staff data for payroll purposes, contractual obligations will apply, as staff will have signed a contract of employment. What is a lawful basis for processing under the GDPR? Do you always need individuals’ consent to process their data?

Real-life examples of social engineering – part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template, available from the market-leading EU GDPR Documentation Toolkit. Example of the privacy notice template included in the EU GDPR Documentation Toolkit.

Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords

Troy Hunt

For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses. Like "Nutella", for example! For example, Bittylicious: In February 2018 we integrated with the excellent HaveIBeenPwned service by @troyhunt to protect users from insecure passwords [link] pic.twitter.com/3Z6W99OqMQ — Bittylicious (@Bittylicious_) May 22, 2018.

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat

Dark Reading

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority

Examples of companies who put their intranet on the internet

ChiefTech

Here are some more examples, both supermarkets in the UK, who make their employee ''intranet'' accessible (i.e. I''ve previously written about the Royal Mail''s externally accessible staff website (unfortunately, if you are outside the UK they have now geoblocked the content). not behind a login or VPN) over the public Web: Asda Green Room blog. Out Tesco , which also includes information about staff benefits and working at Tesco.

Social business is more than adding a social layer: A banking example

ChiefTech

For example, another second tier Australian bank is also talking about overhauling their core banking systems.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

Two Contrarian Thinkers who went Unheeded

Troy Hunt

History Innovation Examples & Lessons contrarian Konrad Kellen Lansdowne letter Lord Lansdowne thinker unheeded Vietnam warLord Lansdowne.

Public Shaming of Companies for Bad Security

Schneier on Security

Troy Hunt makes some good points , with good examples. psychologyofsecurity securityengineering securitypolicies

Former Insider Indicted for Criminal HIPAA Violations

Data Breach Today

Latest Rare Example of Prosecutors Pursuing a HIPAA Case A federal grand jury in Pennsylvania has indicted a former patient coordinator on several counts of wrongfully obtaining and disclosing the health information of others.

This is the old ChiefTech blog.: Internal blogging is just one example of open information sharing inside an organisation

ChiefTech

Sunday, 24 June 2007 Internal blogging is just one example of open information sharing inside an organisation Linking to Seven Reasons for Your Company to Start an Internal Blog on CIO.com , Jack Vinson reflects on a separate discussion about the value of blogging to knowledge management : " In a recent discussion on the ACT-KM discussion list, someone mentioned that blogging is just one means of communication - that it isnt the be-all, end-all of knowledge sharing.

Take Your Security With You From On-Premises to the AWS Cloud

Data Breach Today

Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to provide security services throughout the enterprise.

Cloud 164

Artificial Intelligence Is Set to Rewrite the Rules of Insurance

InfoGoTo

For example, Progressive Insurance has handed out more than $700 million in discounts to customers who let the company track where and how they drive. Few industries stand to gain as much by adopting artificial intelligence as insurance.

Competitive Advantages of Implementing Artificial Intelligence in Banking

InfoGoTo

For example, emails and phone calls can be analyzed for language that can indicates extreme satisfaction or dissatisfaction. Nearly 80% of the information captured during the processing of a mortgage loan is in forms that – until recently – have been all but inaccessible to computers.

Researchers Made Google's Image Recognition AI Mistake a Rifle For a Helicopter

WIRED Threat Level

To safeguard AI, we’re going to need to solve the problem of ‘adversarial examples.’. Security

Key Skills for Records Managers: Working Productively With IT

InfoGoTo

For example, a master data management project requires close coordination between teams on both sides. For example, RIM may specify a certain level of security for some documents.

How Machine Learning Transforms Fraud Management

Data Breach Today

Digital Security: Preventing Unauthorized Access to Company Data

InfoGoTo

Address social engineering, for example, by educating employees about phishing attacks. Modern cyberthreats cost companies in many ways. Major data breaches have led some chief executives to resign from their organizations. Brand damage, fines, lost business and revenues, and dips in stock prices are only tip of the breach-aftermath iceberg. Organizations must recognize and mitigate the threats that affect their digital security most.

WORM Compliance at Work

InfoGoTo

In the finance industry, for example, securities exchanges must use WORM-compliant storage media to meet the requirements of Securities and Exchange Commission rule 17a-4. Vendors create WORM-compliant storage technologies (Write-Once, Read-Many) so that organizations can write (save) data to the media indefinitely. Where WORM compliance is critical, companies naturally prefer WORM media so that data can live and remain available for many years without risk to its integrity.

This is the old ChiefTech blog.: Marching the intranet retreat

ChiefTech

Monday, 28 May 2007 Marching the intranet retreat Another example of the march of the wikis into the intranet zone, this time Thomas Nelson publishing has switched from a "static" intranet to a wiki (care of Michael Sampson ). Another example, and a little closer to home, I noticed that Ark Group in Australia have an intranet tour during August in Sydney that includes a demonstration of Janssen-Cilag s wiki-based intranet. This is the old ChiefTech blog.

This is the old ChiefTech blog.: OK, RSS may not be in so bad a place after all

ChiefTech

Wednesday, 17 January 2007 OK, RSS may not be in so bad a place after all eWeek provides examples of companies where RSS Offers Relief from Enterprise E-Mail Overload (care of Moonwatcher ), offering a more positive view than weve heard in my last post. For example at Procter & Gamble they are using a very Enterprise 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009.

Philips, BD Yet Again Issue Medical Device Security Alerts

Data Breach Today

Experts Say Companies Offer Good Examples of Transparency Philips and Becton Dickinson have each issued multiple alerts this year regarding cybersecurity flaws in some of their medical devices.

How Artificial Intelligence Will Yield a Gusher of Benefits for Energy Companies

InfoGoTo

For example, an engineer could say “show the operational history of all wells in the North Central United States that exceeded their life expectancy by more than 20%.” The oil and gas industries have a long record of meticulous record-keeping , but until recently those records were, by necessity, captured on paper and film.

How to Enable IoT Security and Protect Your Data From Weak Links

InfoGoTo

In addition to your plan for regularly checking to make sure your IoT devices are running the most up to date firmware and related software, regularly check with manufacturers of devices to make sure they’re still providing updates — IoT device markets are still relatively immature, there have been many examples of manufacturers going out of business, ending providing support, and being generally unreliable.

IoT 55

Non-Human Resources for the HR Professional: Harnessing the Data

InfoGoTo

For example, they could standardize common policies and interactions, such as performance tracking. Can you pinpoint the most important aspect of your professional skill set?

The view from the trenches. | ZDNet

Collaboration 2.0

strategy and tactics, here’s an example of some realities from a client side perspective. strategy and tactics, here’s an example of some realities from a client side perspective.

Broadcast or communicate? | ZDNet

Collaboration 2.0

A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere.

Connecting the Dots With Machine Data

Data Breach Today

Matthew Joseff of Splunk on Fighting Fraud With Better Data Machine data and machine learning have the potential to connect disparate data sources, enabling better fraud detection and prevention, says Matthew Joseff of Splunk, who highlights real-world examples of fighting fraud with better data

The Nature of Mass Exploitation Campaigns

Threatpost

Examples of how attackers carry out mass exploitation campaigns and how to defend against them. Hacks InfoSec Insider Privacy DNS False Positives Fast flux Google App Scripts Google Sheets infosec insider Mass Exploitation RFI Exploit Whitehat security

What the Marriott Breach Says About Security

Krebs on Security

For example, if you used your Starwood password anywhere else , that other account you used it at is now at a much higher risk of getting compromised.

NJ AG Smacks Practice With Hefty Fine for Vendor Breach

Data Breach Today

The case is the latest example of the risks posed by vendors Settlement Spotlights Vendor Risks, Plus State Enforcement Trends The New Jersey state attorney general has smacked a medical practice with a $418,000 penalty for a 2016 HIPAA breach involving a vendor's misconfigured server.

Trends 137

The Pentagon is Publishing Foreign Nation-State Malware

Schneier on Security

This feels like an example of the US's new strategy of actively harassing foreign government actors.

Is SMS 2FA Enough Login Protection?

Dark Reading

Experts say Reddit breach offers a prime example of the risks of depending on one-time passwords sent via text

Half of all Phishing Sites Now Have the Padlock

Krebs on Security

But the rapidly increasing adoption of SSL by phishers is a good example in which fraudsters are taking their cue from legitimate sites. Maybe you were once advised to “look for the padlock” as a means of telling legitimate e-commerce sites from phishing or malware traps.

Why drones are revolutionizing asset inspection in oil and gas

OpenText Information Management

In its Oil and Gas Trends 2018-19, PwC suggests that companies should ‘double down’ on digitization to drive operational excellence, citing the use of drones to inspect offshore platforms as a key example. In my previous blog, I looked at operational excellence in oil and gas.

This is the old ChiefTech blog.: Wiki is a verb and a noun

ChiefTech

A wiki by itself is a useful tool, but you can magnify its use greatly in combination with other features (for example social features, blogs, comments etc). " This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.