Remove Groups Remove Manufacturing Remove Mining Remove Privacy
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

LockBit claims responsibility for Capital Health security incident The LockBit ransomware group has claimed responsibility for an attack on Capital Health , a healthcare provider in Pennington, New Jersey, last November. The group has allegedly exfiltrated more than 10 million files. Data breached: 41,500,000 records.

article thumbnail

Leopard Spots and Zebra Stripes: Fraud and Behavioral Analytics

Thales Cloud Protection & Licensing

Luckily, zebras don’t use mobile devices, or manufacturers would be hard at work on stripe recognition technology. About six months ago, I got an email from a good friend of mine, who I’ll call Alex (not his real name). Aite Group estimates U.S. Did you know that every zebra has its own unique stripe pattern?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

suffers second ransomware attack in months Having been struck by a ransomware attack in October by the BlackSuit group , which led to operations and appointments being postponed, Akumin Inc. has suffered a second attack, this time by the BianLian ransomware group. million LivaNova Source 1 ; source 2 (New) Manufacturing UK Yes 2.2

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Yeah, me either, because most of mine are probably like yours: the simplest electrical devices in the house. There's no consistency across manufacturers or devices either in terms of defaulting to auto-updates or even where to find updates. The integration is maturing fast and next release will be really ??

IoT 143
article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

Known records breached Eye4Fraud Source (New) Finance USA Yes 14,900,000 Gumtree Source (New) IT services South Africa Yes 13,300,000 Schneider Electric Source (New) Energy France Yes “terabytes” of data BeatBase ApS Source (New) IT services Denmark Yes 1,648,030 Football Australia Source 1 ; source 2 (New) Leisure Australia Yes 1,421,804 Indian Bank (..)

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. This can also include customer’s expectations such as intuitive navigation, faceted search, search experience, multi-language support, web accessibility, customer privacy, tracking cookies, and marketing opt-out.

article thumbnail

Jason R. Baron of Drinker Biddle & Reath LLP: eDiscovery Trends 2018

eDiscovery Daily

The “trolley car problem” – involving whether one should throw a switch to make sure that a hypothetical train doesn’t hit a group of children instead of a large gentleman — is now a real problem faced by the makers of driverless car software. With driverless cars and taxis, you’re going to see injuries in some cases.