Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst

Another example of email misuse

IT Governance

Another week, another example of an email using the Cc (carbon copy) field instead of the Bcc (blind carbon copy) field. This time, it was West Ham United Football Club. . The email was sent to a group of supporters regarding ticket allocations for an away football match. .

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps.

An Example of Deterrence in Cyberspace

Schneier on Security

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for this.

GDPR: lawful bases for processing, with examples

IT Governance

For example, when you process staff data for payroll purposes, contractual obligations will apply, as staff will have signed a contract of employment. What is a lawful basis for processing under the GDPR? Do you always need individuals’ consent to process their data?

Real-life examples of social engineering – part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS.

How to write an ISO 22301-compliant business continuity plan – with example template

IT Governance

Below is an example of a customisable business continuity plan template from the bestselling ISO22301 BCMS Documentation Toolkit. ISO 22301 certification requires organisations to demonstrate their compliance with appropriate documentation , including a business continuity plan.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template, available from the market-leading EU GDPR Documentation Toolkit. Example of the privacy notice template included in the EU GDPR Documentation Toolkit.

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat

Dark Reading

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority

Examples of companies who put their intranet on the internet


Here are some more examples, both supermarkets in the UK, who make their employee ''intranet'' accessible (i.e. I''ve previously written about the Royal Mail''s externally accessible staff website (unfortunately, if you are outside the UK they have now geoblocked the content). not behind a login or VPN) over the public Web: Asda Green Room blog. Out Tesco , which also includes information about staff benefits and working at Tesco.

Social business is more than adding a social layer: A banking example


For example, another second tier Australian bank is also talking about overhauling their core banking systems.

Two Contrarian Thinkers who went Unheeded

Troy Hunt

History Innovation Examples & Lessons contrarian Konrad Kellen Lansdowne letter Lord Lansdowne thinker unheeded Vietnam warLord Lansdowne.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example


The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

Public Shaming of Companies for Bad Security

Schneier on Security

Troy Hunt makes some good points , with good examples. psychologyofsecurity securityengineering securitypolicies

Former Insider Indicted for Criminal HIPAA Violations

Data Breach Today

Latest Rare Example of Prosecutors Pursuing a HIPAA Case A federal grand jury in Pennsylvania has indicted a former patient coordinator on several counts of wrongfully obtaining and disclosing the health information of others.

This is the old ChiefTech blog.: Internal blogging is just one example of open information sharing inside an organisation


Sunday, 24 June 2007 Internal blogging is just one example of open information sharing inside an organisation Linking to Seven Reasons for Your Company to Start an Internal Blog on , Jack Vinson reflects on a separate discussion about the value of blogging to knowledge management : " In a recent discussion on the ACT-KM discussion list, someone mentioned that blogging is just one means of communication - that it isnt the be-all, end-all of knowledge sharing.

Researchers Made Google's Image Recognition AI Mistake a Rifle For a Helicopter

WIRED Threat Level

To safeguard AI, we’re going to need to solve the problem of ‘adversarial examples.’. Security

Philips, BD Yet Again Issue Medical Device Security Alerts

Data Breach Today

Experts Say Companies Offer Good Examples of Transparency Philips and Becton Dickinson have each issued multiple alerts this year regarding cybersecurity flaws in some of their medical devices.

This is the old ChiefTech blog.: Marching the intranet retreat


Monday, 28 May 2007 Marching the intranet retreat Another example of the march of the wikis into the intranet zone, this time Thomas Nelson publishing has switched from a "static" intranet to a wiki (care of Michael Sampson ). Another example, and a little closer to home, I noticed that Ark Group in Australia have an intranet tour during August in Sydney that includes a demonstration of Janssen-Cilag s wiki-based intranet. This is the old ChiefTech blog.

This is the old ChiefTech blog.: OK, RSS may not be in so bad a place after all


Wednesday, 17 January 2007 OK, RSS may not be in so bad a place after all eWeek provides examples of companies where RSS Offers Relief from Enterprise E-Mail Overload (care of Moonwatcher ), offering a more positive view than weve heard in my last post. For example at Procter & Gamble they are using a very Enterprise 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009.

Connecting the Dots With Machine Data

Data Breach Today

Matthew Joseff of Splunk on Fighting Fraud With Better Data Machine data and machine learning have the potential to connect disparate data sources, enabling better fraud detection and prevention, says Matthew Joseff of Splunk, who highlights real-world examples of fighting fraud with better data

The view from the trenches. | ZDNet

Collaboration 2.0

strategy and tactics, here’s an example of some realities from a client side perspective. strategy and tactics, here’s an example of some realities from a client side perspective.

Broadcast or communicate? | ZDNet

Collaboration 2.0

A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere.

NJ AG Smacks Practice With Hefty Fine for Vendor Breach

Data Breach Today

The case is the latest example of the risks posed by vendors Settlement Spotlights Vendor Risks, Plus State Enforcement Trends The New Jersey state attorney general has smacked a medical practice with a $418,000 penalty for a 2016 HIPAA breach involving a vendor's misconfigured server.

Trends 141

Is SMS 2FA Enough Login Protection?

Dark Reading

Experts say Reddit breach offers a prime example of the risks of depending on one-time passwords sent via text

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: Right, the Trusted Foundry program I guess is a good example. BK: Can you give some examples? Are there other examples of how the cloud providers can make it harder for attackers who might seek to subvert their services through supply chain shenanigans? BK: For example….?

GUEST ESSAY: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

The Last Watchdog

It does appear that this is another example of attacks successfully penetrating a weak supply chain link, underscoring the importance of addressing third-party risks. For example, the personal and credit card information obtained in the DoD breach could be crossed referenced with data obtained from the OPM breach and other widely publicized private sector breaches.

This is the old ChiefTech blog.: Wiki is a verb and a noun


A wiki by itself is a useful tool, but you can magnify its use greatly in combination with other features (for example social features, blogs, comments etc). " This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

This is the old ChiefTech blog.: Replace or redundant?


This option has been seen for years as a solution for developing countries - for example, even recently there was news about a province of Vietnam where community phones are being replaced with high-speed WiMAX broadband connections and VoIP telephony. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009. ©2005-2009.

This is the old ChiefTech blog.: Biffo between IT, users and the extended enterprise


Nolan says: " here in the real world we are seeing examples of business units taking more control of their IT environments and telling corporate IT to go away " Gotta responds: " When there is a lack of trust, cooperation, shared ownership, sense of community and governance spanning business and IT, bad things happen. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at ©2005-2009. ©2005-2009.

5 steps for choosing the proper analytical tools

Information Management Resources

One issue that has plagued corporations for years is the lack of standards and methods around their analytical capabilities, one example of which is deciding which analytical tools to build deep competencies around. Analytics Chief Analytics Officer Predictive analytics

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

That example gives a whole new meaning to the term “supply chain,” doesn’t it? Indeed there are numerous examples of other countries — including the United States and its allies — slipping their own “backdoors” into hardware and software products.

IT 223

Beware of Hurricane Florence Relief Scams

Krebs on Security

For example, several of these domains redirect to , a legitimate nonprofit religious group based in North Carolina that accepts donations through several domains that use an inline donation service from — a maker of “church management software.”

Tips 214

Renault-Nissan alliance seeks robo-taxi deals with tech players

Information Management Resources

The automakers want to work with technology companies that are already experimenting with self-driving cars -- for example, Google and Uber Technologies Inc. Driverless Artificial intelligence Machine learning

7 Variants (So Far) of Mirai

Dark Reading

Mirai is an example of the newest trend in rapidly evolving, constantly improving malware. These seven variants show how threat actors are making bad malware worse

Naming & Shaming Web Polluters: Xiongmai

Krebs on Security

The Xiongmai debacle is yet another example of why this remains solid advice]. For example, Flashpoint’s analysts discovered that the login page for a camera or DVR running Xiongmai hardware and software could be bypassed just by navigating to a page called “DVR.htm” prior to login.

U.S. Mobile Giants Want to be Your Online Identity

Krebs on Security

In another example, participating sites could use Project Verify to supplement or replace existing authentication processes, such as two-factor methods that currently rely on sending the user a one-time passcode via SMS/text messages, which can be intercepted by cybercrooks.

Tax-Season Malware Campaign Delivers Trojan Via Email

Dark Reading

A new example of a long-term phenomenon delivers a banking trojan via a downloader activated by a URL in a phishing email

6 Real Black Friday Phishing Lures

Dark Reading

As the mega-shopping day approaches, here's a look at six examples of phishing attacks - and ways to avoid taking the bait

Thriving as a woman in tech: A Q&A with OpenText VP, Lynn Elwood

OpenText Information Management

Lynn Elwood, VP of Cloud & Services Solutions, is a prime example of this. Gone are the days of the “job ladder” – following one linear path for your entire career. Instead, professionals today tend to create their own adventure by gaining experience across a wider range of disciplines.

Cloud 85

Reddit Breach Highlights Limits of SMS-Based Authentication

Krebs on Security

Fundamentally, two-factor authentication involves combining something you know (the password) with either something you have (a device) or something you are (a biometric component, for example).

Join us and discover essential survival tips for modern records managers

TAB OnRecord

In a brief talk, Kurt will share TAB’s industry experience and several customer examples to show you how… Read More. For our colleagues in Boston, Minneapolis and Chicago, we invite you to join us at an intimate learning opportunity.