Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. During our Cyber Threat Intelligence monitoring we spotted new malicious activities targeting some Italian companies operating worldwide in the manufacturing sector, some of them also part of the automotive production chain. SecurityAffairs – Italian manufacturing, hacking).

Reltio Cloud – A Data Platform Perfect For Google Anthos


The last Google Cloud Next’19 conference had a focus on better enabling enterprises to adopt a multi-cloud architecture with announcements of tools that address concerns around security, “vendor lock-in”, code migration between clouds, and support of open source. Unified DevOps tooling – integrated monitoring, logging, traceability, security, and API management. Anastasia Zamyshlyaeva , Reltio.

MDM 63

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

#ModernDataMasters: Sarit Bose, Cognizant


If you are going to create a single version of the truth it needs to be a single version of SECURED truth. Uncategorized B Compliance & GDPR B Consumer 360 B Customer 360 B Digital Transformation B Financial Services & Insurance B Healthcare B High-Tech & Manufacturing B IT B Business B Life Sciences B Machine Learning B Patient & Member 360 B Retail & CPGKate Tickner, Reltio. Sarit Bose is the Head of Business Analytics and Insights at Cognizant UK&I.

MDM 50

Adidas data breach

IT Governance

Adidas is the second largest sportswear manufacturer in the world, and this data security incident demonstrates yet again that organisations of all types are at threat of attack. It is essential that organisations know how to respond appropriately to a cyber security incident.

Australia banned Huawei from 5G network due to security concerns

Security Affairs

Chinese-owned telecommunications firm Huawei has been banned from Australia’s 5G network due to security concerns. Has safely & securely delivered wireless technology in Aust for close to 15 yrs.

Agile BI & Analytics is the Need of the Hour – Drive insights during Pandemic Uncertainty

Perficient Data & Analytics

For a Retail business – Blend Public and Enterprise Data to. Secure Framework for PII or Highly confidential data.

#ModernDataMasters: Steve Whiting, Chief Operations Officer


Ethical data management means you need data governance and data security by design – these initiatives are hard to retrofit. Especially in the Big Data age, you have to know where your data comes from, what it is used for, what security measures are applied to it but also what its value is to the business. Kate Tickner, Reltio.

MDM 40

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

The Last Watchdog

Pick any company in any vertical – financial services, government, defense, manufacturing, insurance, healthcare, retailing, travel and hospitality – and you’ll find employees, partners, third-party suppliers and customers all demanding remote access to an expanding menu of apps — using their smartphones and laptops. It becomes difficult to build security into the application when you are doing that frequent of a change and you end up more exposed to risk.

Common Ingestion Framework

Perficient Data & Analytics

May it be healthcare, retail, finance or manufacturing, everyone is at different stages in their journey to create their industry-grade, enterprise-ready Data Lake repository. Architecting and implementing big data pipelines to ingest structured & unstructured data of constantly changing volumes, velocities and varieties from several different data sources and organizing everything together in a secure, robust and intelligent data lake is an art more than science.

The Cost of Dealing With a Cybersecurity Attack in These 4 Industries

Security Affairs

In addition to the monetary costs associated with things like lost productivity and improving network security to reduce the likelihood of future incidents, affected companies have to deal with the costs tied to reduced customer trust and damaged reputations. Retail. As people have growing opportunities to shop online, the chances for hackers to carry out lucrative cyberattacks in the retail sector also go up. Manufacturing.

Addition to Washington Breach Law Imposes Retailer Liability in Payment Card Breaches

Hunton Privacy

Under a Washington law effective July 1, 2010, certain entities involved in payment card transactions may be liable to financial institutions for costs associated with reissuing payment cards after security breaches. Designed to encourage the reissuance of payment cards as a means of mitigating harm caused by security breaches, Washington H.B. Financial Privacy Security Breach Data Processor Payment Card PCI DSS Safe Harbor Washington

Iran-linked APT group Pioneer Kitten sells access to hacked networks

Security Affairs

The Iranian hacker group has been attacking corporate VPNs over the past months, they have been hacking VPN servers to plant backdoors in companies around the world targeting Pulse Secure , Fortinet , Palo Alto Networks , and Citrix VPNs.

440M records found online in unprotected database belonging to Estée Lauder

Security Affairs

A security expert discovered that the Cosmetic firm Estée L auder exposed 440 million records online in a database that was left unsecured. The security expert Jeremiah Fowler discovered an unsecured database belonging to the Cosmetic firm Estée L auder that contained 440,336,852 records.

California IT service provider Synoptek pays ransom after Sodinokibi attack

Security Affairs

Synoptek has more than 1,100 customers across multiple industries, including local governments, financial services, healthcare, manufacturing, media, retail and software. .

Business Continuity Plans Must Evolve for the Post-COVID World


Many employees have been forced to connect to business networks from computers that lack company-sanctioned software, up-to-date malware protection, encryption controls and secure email clients. Security risks have been amplified by the need for some employees to share computers with roommates and children. “Without email, places come to a screeching halt,” said Stan Lowe, Chief Information Security Officer at cloud security vendor Zscaler, in an article on

Cloud 76

Ransomware at IT Services Provider Synoptek

Krebs on Security

based Synoptek is a managed service provider that maintains a variety of cloud-based services for more than 1,100 customers across a broad spectrum of industries , including state and local governments, financial services, healthcare, manufacturing, media, retail and software.

New financially motivated attacks in Western Europe traced to Russian-speaking threat actors

Security Affairs

At least two companies operating in pharmaceutical and manufacturing sectors have been affected. According to industry researchers, TA505 is known to have carried out attacks on banks, medical institutions retailers and other businesses in the past. If the latter are the ones to blame, this marks the first time the gang has launched the attacks against pharmaceutical and manufacturing companies and may indicate a significant shift in their modus operandi. .

More than half of consumers would consider legal action if their data was compromised during a breach

Thales eSecurity

Those across the manufacturing and utilities industries had the highest preparedness rates at 91%, while retail had the lowest across both countries at 78%. Manufacturing & Utilities. Retail, Catering & Leisure. Data security


Trickbot gang and Lazarus APT, the hidden link behind an epochal phenomena

Security Affairs

Security experts Sentinelone have published a report that for the first time sheds the light on the link between the TrickBot crimeware and the North Korea-linked APT group Lazarus.

Sales 68

Priming the payments ecosystem for explosive growth

Thales eSecurity

This week marks the return of Amazon Prime Day – Amazon’s seasonal retail event which has fast become a masterclass in driving demand and growth through great customer experience. Many manufacturers and third-party merchants now actually save their best deals for Prime Day knowing millions of extra shoppers will be buying goods via the online store. Yet, businesses must keep up with these demands without losing sight of security and stability. Data security

Data Science Virtual Expert Panel Presented by AWS

Perficient Data & Analytics

Amazon Personalize can: Keep the data it analyzes private and secure, and only uses it for your customized recommendations. Secure your business data and peace of mind. Join us and our partner Amazon Web Services (AWS) for a virtual Q&A session on Wednesday, April 15.

List of data breaches and cyber attacks in June 2020 ­– 7 billion records breached

IT Governance

The first half of 2020 ended on a familiarly bad note, with 92 security incidents accounting for at least 7,021,195,399 breached records. Duluth student alerted school district about security breach (unknown). University of Missouri Health Care discloses 2019 security incident (unknown). Luke’s Health Memorial Lufkin notifies patients of April security incident (unknown). Tait Towers Manufacturing discloses security incident affecting employee data (unknown).

Why you should be concerned about payment card data breaches

IT Governance

In this blog, we look at the ongoing threat of debit and credit card fraud, explaining why it appeals to cyber criminals, what they do with the stolen information and how implementing the requirements of the PCI DSS (Payment Card Industry Data Security Standard) can thwart crooks’ schemes.

2018 Predictions – Rise of IoT adoption will increase cybersecurity attacks

Thales eSecurity

First, John Grimm, our Senior Director of Security Strategy writes, “As we look at the IoT, especially at OT-type environments and manufacturing plants, where there are industrial-type systems that are all connected, we’re starting to see how the operational world and the traditional IT world will come together. safety of employees) and IT security. In 2018, Sol says we are likely to see a greater desire among organizations for more secure micro-services.

IoT 75

SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses

The Last Watchdog

As a result, the way in which they connect and authorize communication makes them a primary security risk for organizations. The report, titled The Economic Impact of Machine Identity Breaches , was commissioned by Salt Lake City, UT-based security vendor Venafi. Hudson: We have about 400 customers worldwide: big banks, big airlines, airplane manufacturers, big payment card companies, big health care insurers, big retailers.

PCI DSS: Lessons to learn from recent payment card breaches

IT Governance

Over the past month or so, we’ve been discussing the threats associated with payment card breaches, and why it’s important to comply with the PCI DSS (Payment Card Industry Data Security Standard). Stay secure with the PCI DSS.

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

In an environment where a heating and ventilation subcontractor can pose an existential risk to a billion dollar retail chain – as infamously happened to Target – just knowing where to start assessing third party risk can be a challenge for any organization, Jordan told me. You also have different perspectives; you’ve got privacy concerns, security concerns, business continuity concerns.” Accounting for third-party risks is now mandated by regulations — with teeth.

Risk 131

MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns

The Last Watchdog

Current attack trends add urgency, and catching up on doing basic security best practices isn’t enough. Eventually, governments will address the risk by beefing up security and purchasing cyber insurance, which go hand in glove. Election tampering The wide exposure to election tampering stems from having too many voter registration databases coming on line that were never security hardened, and by now have been plundered several times over by malicious, automated botnets.

Market volume of illegal online sales of alcohol exceeded 30 million USD in 2018 in Russia

Security Affairs

Security firm Group-IB has estimated that the market volume of illegal online sales of alcohol in Russia exceeded 30 million USD in 2018, i.e. almost 5.8 Such schemes are used by both resellers who sell alcohol online bought from major retailers as well as fraudsters who sell counterfeit products. The post Market volume of illegal online sales of alcohol exceeded 30 million USD in 2018 in Russia appeared first on Security Affairs.

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

The economic sectors represented by ten or more survey respondents include the following: agriculture; construction; manufacturing; retail trade; transportation and warehousing; information; real estate rental and leasing; professional, scientific, and technical services; management services; waste management; educational services; and arts and entertainment. Still, I like seeing this kind of analysis about security infrastructure.

Customer Experience Trends: How To Stand Out From the Crowd


Every organization — from mom and pop shops to pharmaceutical manufacturers — must adopt tools and techniques for providing the hyper-personalized experiences customers require at every touchpoint in their journey. .

Campaign leverages, BlogSpot, and Pastebin to distribute RevengeRAT

Security Affairs

Attackers hit organizations in several industries including Technology, Retail, Manufacturing, State/Local Government, Hospitality, Medical, and other Professional business. The post Campaign leverages, BlogSpot, and Pastebin to distribute RevengeRAT appeared first on Security Affairs. APT Breaking News Malware Hacking Pierluigi Paganini RevengeRAT Security Affairs

Cognitive Agents to Improve User Experience

Perficient Data & Analytics

This technology can also improve data security, customer and employee experience, and visibility over business processes. Others have also seen benefits by combining cognitive agents with internal processes to do things like speed up on-boarding processes and reduce security concerns and errors. . In a world where over 2.5 quintillion bytes of data is created each day , having a tool to help deliver information to users efficiently is important.

FTC, privacy, and vendor due diligence—and opt-in consent

Data Protection Report

Federal Trade Commission (FTC) released for public comment an administrative complaint and proposed consent agreement with mobile phone manufacturer BLU Products Inc. According to the FTC’s complaint, BLU Products, which has sold millions of mobile devices worldwide through online as well as brick-and-mortar retailers, outsourced the actual manufacture of the devices to third parties. Regulatory response consent consumer protection data security FTC order

RFID Market – Global Forecast to 2023

RFID Global Solution, Inc.

The RFID ecosystem comprises chip and inlay providers, tag manufacturers, reader and software providers, and system integrators. Manufacturers of field devices such as sensors, controllers, actuators, relays, and valves. Software designers and manufacturers. End-user industries such as retail, logistics and supply chain, commercial, sports, healthcare and others. Retail. Security and Access Control. MarketsandMarkets. June 2017.

Businesses to Assist NHS Test and Trace Efforts

Hunton Privacy

Going forward, this type of additional data collection is likely to be applied not only in the hospitality sector but also in the education, retail and manufacturing sectors, as they reopen. Depending on the nature of data collection, additional measures may be required to keep the data secure. The UK Prime Minister, Boris Johnson, announced on June 23, 2020, that restrictions relating to COVID-19 would be eased as of July 4.

ELO Digital Office USA Expands into Canada with flexxus Business Solutions

Document Imaging Report

flexxus helps businesses enhance their ERP and CRM systems with an integrated suite of cloud-based solutions that feature dashboards, reporting tools, centralized security, and powerful customization tools. flexxus focuses on manufacturing, ecommerce, retail, technology and project-based businesses that want to use modern technology to grow their business while attracting and retaining quality staff.

German DPAs Adopt Resolutions Regarding “Connected Cars” and Cooperation with Competition Authorities

Hunton Privacy

According to the DPAs, automobile manufacturers, distributors, retailers, repair shops and providers of communications and telemedia services must ensure the informational self-determination of drivers. Ensure that data subjects ( e.g. , drivers and owners) are able to recognize, control and stop data transfers to service providers, such as the vehicle manufacturer, if the transfer is based on contract or consent.

62% of organisations unaware of the GDPR

IT Governance

Among those that have started to prepare: 36% of businesses and charities have changed their cyber security practices; 21% of businesses and 10% of charities have invested in additional staff training; and. Construction (25%) and the production and manufacturing (27%) sectors are among the least aware of the GDPR. However, the least prepared sector is retail and wholesale, with only 13% of organisations having started.


States Attempt to Address Privacy Risks Associated with Digital Copiers and Electronic Waste

Hunton Privacy

As reported in BNA’s Privacy Law Watch , on April 1, 2011, a New York law went in effect requiring manufacturers of certain electronic equipment, including devices that have hard drives capable of storing personal information or other confidential data, to register with the Department of Environmental Conservation and maintain an electronic waste acceptance program. Information Security U.S.