Coffee Meets Bagel dating app confirms data breach

Security Affairs

The week closes with the news of another embarrassing data breach, the Coffee Meets Bagel confirmed a hack on Valentine’s Day. The dating app Coffee Meets Bagel confirmed that hackers breached its systems on Valentine’s Day and may have obtained access to users’ account data. Coffee Meets Bagel learned of the incident on Feb. million Coffee Meets Bagel accounts (673 MB of data) were offered for sale. SecurityAffairs – Coffee Meets Bagel , hacking).

Meet Team Hanzo: Bess Spencer, Application Engineer Extraordinaire

Hanzo Learning Center

Engineer Meet Team Hanzo Hanzo employee profile hiring careerHow does the saying go? You can’t shoot for the moon if you don’t reach for the stars? At Hanzo, we hold these aspirations near and dear to our hearts.

Coffee Meets Bagel Dating App Warns Users of Breach


Breach 617 million records breach coffee meets bagel Dark Web data breach dating app OKCupid Phishing Scams security flaw Valentine’s DayThe dating site said users' names and email addresses that were added to the system prior to May 2018 may be impacted.

When Encryption Meets Flash Arrays

Thales eSecurity

Fortunately, meeting the customer requirements is possible using a key sharing paradigm but requires close collaboration between the application and storage array vendors. The post When Encryption Meets Flash Arrays appeared first on Data Security Blog | Thales e-Security.

Cisco WebEx Meetings affected by a new elevation of privilege flaw

Security Affairs

A vulnerability in the update service of the Cisco Webex Meetings Desktop App for Windows could allow elevation of privilege. The update service of Cisco Webex Meetings Desktop App for Windows fails to validate version numbers of new files.

Meet Perficient’s Chief Strategists: Christine Livingston

Perficient Data & Analytics

I even flew my oldest, who was just one-year-old at the time, to Australia, just the two of us, to meet my husband! Thrilling our clients with innovation and impact – it’s not just rhetoric. This belief is instrumental for our clients’ success.

The role of blockchain in helping organizations meet GDPR compliance

Information Management Resources

Many have begun to consider whether the technology could be used to improve customer data management processes, as they relate to the upcoming EU mandate. GDPR Blockchain Data management Data privacy Data security

Credit card gambling ban: government to meet banks and bookies

IT Governance

Ahead of the Commission’s call for evidence on the issue next month, the culture secretary, Jeremy Wright, has called on banks and bookmakers to meet to discuss the issue.

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

The Last Watchdog

Meeting compliance. This was because, as the complexity of business networks continued to intensify, so did the challenges of meeting data handling requirements under the Payment Card Industry Data Security Standard, the Health Insurance Portability and Accountability Act, the Sarbanes-Oxley Act, and the Federal Information Security Management Act.

Trump – Putin meeting: “I don’t see any reason” for Russia to interfere with the US presidential election

Security Affairs

Today the controversial meeting between Russian President Vladimir Putin and US President Donald Trump was held in Helsinki, but as expected Russian President denied any interference with the 2016 US election.

Critical Zoom Flaw Lets Hackers Hijack Conference Meetings


Hackers can spoof messages, hijack screen controls and kick others out of meetings. Vulnerabilities Web Security patch Spoofing unauthorized command execution vulnerability zoom

Meet the New 'Public-Interest Cybersecurity Technologist'

Dark Reading

A grassroots movement is emerging to train high-risk groups and underrepresented communities in cybersecurity protection and skills - all for the public good

Educating today’s information professionals to meet tomorrow’s challenges

IG Guru

The post Educating today’s information professionals to meet tomorrow’s challenges appeared first on IG GURU. Master of Archives and Records Administration (MARA) Celebrates its 10th Anniversary By Dr. Patricia C.

Compliance Meets Social APIs

Hanzo Learning Center

The Surprising Irony at the Intersection of Compliance and Social APIs. Compliance article

Meet 5 Women Shaping Microsoft's Security Strategy

Dark Reading

Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity

Seven Data Security Challenges You Must Meet to Comply with GDPR

Thales eSecurity

The post Seven Data Security Challenges You Must Meet to Comply with GDPR appeared first on Data Security Blog | Thales eSecurity. The enactment of the European Union’s General Data Protection Regulation (GDPR) is a significant milestone for virtually every international business.

DevOps adoption rises to meet business, data privacy demands

Information Management Resources

DevOps adoption is increasing and spreading across organizations, bringing together application and database development, delivering business benefits, and helping companies comply with data privacy regulations. Hardware and software Data management Data strategy

Meet Our Digital Marketing & MicroStrategy Experts at NRF 2019

Perficient Data & Analytics

If you’re attending NRF 2019 , be sure to stop by the MicroStrategy booth (#1955) to meet with Perficient experts Jim Butz, MicroStrategy Practice General Manager, and Kevin Bauer, Digital Marketing Practice Director, as they showcase demos and retail expertise.

Demo 55

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. This post summarizes the highlights from this meeting. In light of this, the (A) Committee granted an extension of the model law development request to the Spring 2019 National Meeting. The post Regulatory Update: NAIC Fall 2018 National Meeting appeared first on Data Matters Privacy Blog.

Data Governance Is Dead — Meetings And Spreadsheets Killed It

IG Guru

The post Data Governance Is Dead — Meetings And Spreadsheets Killed It appeared first on IG GURU. Stan Christiaens Mar 26, 2018, 08:00am CommunityVoice Forbes Technology Council We all know that data governance has perception issues (to put it mildly).

Ransomware Meets 'Grey's Anatomy'

Dark Reading

Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks

Conversation with TSLAC Archivist About Meeting Minutes

The Texas Record

With The Open Meetings Act (Texas Government Code – GOV’T § 551.021.) At its root, my work involves figuring out what something is and translating that information into something others can use to determine if materials meet one’s needs.

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Security Affairs

Researchers discovered a “high” severity command injection vulnerability, tracked as CVE-2018-15442, in Cisco Webex Meetings Desktop. The vulnerability affects all Cisco Webex Meetings Desktop App releases prior to 33.6.0,

Meet new Archive-It and Web Group teammates


Announcements Meet the Archive-It Teamby the Archive-It team. Archive-It and the Internet Archive’s Web Group welcomed three new teammates this fall.

Meeting GDPR’s toughest challenges

Information Management Resources

GDPR in fact consists of many new requirements for data security and data privacy for any organization.

NetVault Backup Meets Office 365 Exchange Online

Quest Software

Learn how using NetVault Backup with Office 365 Exchange Online can simplify data protection; speed backups and recovery; boost security and lower costs.( read more ). Data Protection Office 365 NetVault Microsoft Office

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it. Security

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. This post summarizes the highlights from this meeting. At the Summer Meeting, the Working Group agreed to expose the Trades Letter for a 45-day comment period. The Working Group hopes to consider the adoption of the guidance document at the NAIC’s Fall 2018 National Meeting.

Most organizations off to slow start at meeting GDPR requirements

Information Management Resources

While many organizations understand the importance of GDPR, a large number are still not taking their data seriously in terms of the technologies and processes they have in place, says Penny Jones. GDPR Compliance Compliance systems

Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again

Security Affairs

The flaw affects Cisco Webex Meetings Desktop and has been rated as a “high” severity command injection vulnerability. The CVE-2018-15442 flaw affects all Cisco Webex Meetings Desktop App releases prior to 33.6.0, The post Initial patch for Webex Meetings flaw WebExec was incomplete.

Meet Your 2018-2019 Records Management Section Steering Committee

The Schedule

The Records Management Section (RMS) Steering Committee exists to direct and focus the annual business of the section, as well as to foster connections and professional growth amongst section members.

5 Reasons to Meet Hanzo at Legaltech - January 29 -31, 2019

Hanzo Learning Center

That is why we’d like to invite you to meet in the suite. It’s time for Legaltech, the the largest and most important legal technology event of the year. Hanzo, will be demonstrating its pioneering technology in dynamic web archiving for compliance and ediscovery professionals.

AI-enhanced search meets enhanced workflow with Decisiv 8.1

OpenText Information Management

part of OpenText Release 16 EP3—is not only … The post AI-enhanced search meets enhanced workflow with Decisiv 8.1 Finding the content you need is paramount when trying to complete tasks and make informed decisions. That’s why OpenText™ Decisiv™ augments enterprise search with the power of artificial intelligence.

Identifying E-signature Requirements to Accelerate Digital Adoption and Meet Global Compliance


In a recent AIIM webinar, Craig Le Clair, Forrester VP and Principle Analyst, and Florian Vondal, Allianz Solution Architect, took a closer look at the “esign of the times” and what must be considered when attempting to accelerate e-signature adoption enterprise-wide and meet global compliance.

Coffee Meets Bagel Confirms Hack on Valentine's Day

Dark Reading

The dating app says users' account data may have been obtained by an unauthorized party

Meet Jonathan Albright, The Digital Sleuth Exposing Fake News

WIRED Threat Level

Buried in media scholar Jonathan Albright's research was proof of a massive political misinformation campaign. Now he's taking on the the world's biggest platforms before it's too late. Backchannel Security

Trump-Putin Meeting was the root cause of a spike of cyber attacks against Finland

Security Affairs

F5 experts observed a spike in the attacks in the days prior to the Trump-Putin meeting on July 16 that was held in Helsinki, Finland. As expected, attacks against Finland skyrocketed days before the meeting. Which were the other top targeting countries during the Helsinki meeting?

Cyber resilience in the Scottish public sector: meeting the Cyber Essentials certification deadline

IT Governance

In addition to meeting the requirements of Cyber Essentials, organisations must undergo an internal assessment and internal scan conducted on-site by the certification body.

4 steps for meeting GDPR-ready identity governance

Information Management Resources

Many of the new data protection requirements can be sustainably and cost-effectively adhered to by leveraging existing tools and processes that are already deployed in a typical organization. GDPR Compliance Data security Compliance systems

How Identity and Access Management helps meet the data protection requirements of GDPR

OpenText Information Management

GDPR has changed the way that companies with European … The post How Identity and Access Management helps meet the data protection requirements of GDPR appeared first on OpenText Blogs.