Meeting Identity Proofing Challenges

Data Breach Today

Andrew Bud of iProov discusses how identity proofing is evolving to meet the challenge Andrew Bud of iProov Discusses How Technology Can Counter Emerging Fraud Techniques Knowing your customer has become of more a challenge in a world where in-person interaction has become scarce.

164
164

Here's How I Meet

Troy Hunt

Since I began dropping content into this post, pretty much everyone now finds themselves in the same position - conducting most of their meetings online courtesy of COVID-19. Juggling meeting logistics in a globally remote environment can be.

IT 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Meet Bluetana, the Scourge of Pump Skimmers

Krebs on Security

“ Bluetana ,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests. Data collected in the course of the investigation also reveals some fascinating details that may help explain why these pump skimmers are so lucrative and ubiquitous.

Read this before your next employee hits the ‘record’ button on an online meeting via ZDNet

IG Guru

The post Read this before your next employee hits the ‘record’ button on an online meeting via ZDNet appeared first on IG GURU. Privacy Record Retention Records Management Risk News Online Meetings Recording ZDNETCheck out the article here.

Cold Calling Tips and Tricks

In recent years, cold calling has become synonymous with rejection and failure. But the numbers aren't that clear; while less than 2% of today’s cold calls actually result in meetings, 78% of decision-makers have taken an appointment or attended an event as a result of a cold call. What’s the verdict?

Zoom Promises Geo-Fencing, Encryption Overhaul for Meetings

Data Breach Today

Web Conferencing Provider Blames Routing of Keys via China on Scaling-Up Error Zoom, responding to research that identified encryption and infrastructure shortcomings in its audio and video conferencing software, has promised to further revamp its security controls. With COVID-19 driving a surge in working from home, researchers have been closely reviewing the security of such software

RMS Section Meeting Teaser #6

The Schedule

Meet the RMRT Steering Committee Records ManagementOur sixth and final panelist teaser is from Jessika Drmacich of Williams College. The RMS panel is set for this coming Monday, July 27th at 3pm ET. Synopsis of her lightning round presentation: The records management program at Williams College began formally in 2012 and has since evolved into a robust ecosystem across campus.

IT 40

Zoom Fixes Flaw That Could Allow Strangers Into Meetings

Data Breach Today

Check Point Guessed Valid Meeting IDs, Allowing for Snooping Conferencing service provider Zoom has fixed a vulnerability that - under certain conditions - could have allowed an uninvited third party to guess a meeting ID and join a conference call. The exploitation of the flaw revolves around guessing IDs for meetings that aren't password-protected

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings

Threatpost

The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting. Vulnerabilities Web Security Cisco cisco flaw Cisco patch Cisco video conferencing vulnerability conference meeting high severity flaw patch video conferencing Webex WebEx flaw

Mitigating the Risks Posed by AI Meeting Assistants

Data Breach Today

AI meeting assistants present increasing risks as more companies rely on teleconferencing during the COVID-19 pandemic, says U.K.-based based Steve Marshall, CISO at Bytes Technology, an IT and cybersecurity consultancy, who discusses risk mitigation steps

Risk 120

The Impact of Direct Dials on Sales Productivity

Leveraging the latest industry research, this eBook highlights the impact of direct dial phone numbers on sales productivity with the goal of empowering reps to have more conversations with prospects, and consequently, schedule more meetings, increase opportunities, and close more business - fast.

Zoom Fixes Flaw Opening Meetings to Hackers

Threatpost

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting. Vulnerabilities Web Security cpx 360 teleconference meeting web conferencing zoom zoom flaw

Meet Perficient’s Chief Strategists: Mike Porter

Perficient Data & Analytics

Mike Porter , CRM and Data Chief Strategist, has more than 21 years of experience helping clients define data strategies and build CRM solutions that meet their present and future needs. Data & Analytics Digital Transformation Strategy Big Data business analytics Chief Strategists CRM customer relationship management Data Analysis Data Strategy digital transformation Meet Our Chief Strategists Perficient Chief Strategists

Meet Ike

Archives Blogs

As a new memorial is unveiled, now is the time for us to meet Dwight David Eisenhower. The 25,000 square feet of all-new exhibits located in the museum building is where visitors get to meet Ike and Mamie again…for the first time.

Coffee Meets Bagel dating app confirms data breach

Security Affairs

The week closes with the news of another embarrassing data breach, the Coffee Meets Bagel confirmed a hack on Valentine’s Day. The dating app Coffee Meets Bagel confirmed that hackers breached its systems on Valentine’s Day and may have obtained access to users’ account data. Coffee Meets Bagel learned of the incident on Feb. million Coffee Meets Bagel accounts (673 MB of data) were offered for sale. SecurityAffairs – Coffee Meets Bagel , hacking).

How ZoomInfo Helps Overcome the Top Pain Points of Inside Sales

Recent digital transformation has shifted the B2B landscape by ushering in the era of buyer empowerment. With more access to user reviews, analyst opinion, and industry research, decision-makers are more informed than ever while navigating what is now known as the “buyer’s journey.”

Cisco Webex Vulns Let 'Ghost' Attendees Spy on Meetings

Dark Reading

Three vulnerabilities, patched today, could let an attacker snoop on meetings undetected after the host removes them

69

2020 RMS annual meeting

The Schedule

SAA is going virtual this year, and the annual meeting for our Records Management Section will take place Monday, July 27th from 2-3:15pm Central Time. This meeting will be recorded and made available at a later date, but we highly encourage you to join us live so you can interact with your fellow practitioners. Then we’ll conclude our meeting by hosting breakout sessions to focus in on a particular aspect of records management work, including: RIM education.

Zoom Debuts New Tools to Fight Meeting Disruptions

Dark Reading

let hosts and co-hosts pause Zoom meetings to remove and report disruptive attendees Two new capabilities in version 5.4.3

67

INSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM Group

Micro Focus

INSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM Group Rod Flavell, founder and chief executive officer of the FDM Group, ensures that inclusivity is engrained into FDM’s corporate values and that the organization instils a culture of acceptance.

52

Best Practices for Modern Records Management and Retention

Speaker: Sean Baird, Director of Product Marketing at Nuxeo

Documents are at the heart of many business processes. Organizations in highly regulated industries are realizing that traditional records management practices are insufficient and ineffective in today’s digital world. Join Sean Baird as he highlights best practices for effective records management and retention. He will explore how digital transformation can counteract the costs, inefficiencies, and end-user considerations that make it difficult to maintain compliance. He will highlight real-world successes and analyze the key strategies and technologies that help organizations find balance.

The next step in AI-based meeting management

DXC

Microsoft this spring has been rolling out intelligent features in Outlook designed to make work meetings both easier to schedule and more productive. Partners Workplace AI calendar collaboration Email Meetings Microsoft OutlookThe new features appear in Outlook’s email application and calendar. It seems like a pretty good marriage of artificial intelligence (AI) and enterprise productivity needs — and done in a way that […].

Meet Perficient’s Chief Strategists: Arvind Murali

Perficient Data & Analytics

By focusing on the business outcomes, we can build and implement data solutions that are broad enough to meet clients’ current needs and nimble enough to scale for future iterations. These questions define our approach to creating data governance solutions that meet clients’ specific goals. Thrilling our clients with innovation and impact – it’s not just rhetoric. This belief is instrumental for our clients’ success.

MDM 50

RMS Section Meeting: teasers!

The Schedule

As the Annual SAA virtual meeting and the Records Management Section virtual meeting approaches, we want to bring your attention to the fabulous panel we planned: The Records Manager in the Library (panelists: Jessika Drmacich, Williams College; Krista Oldham, Clemson University; Eric Stoykovich, Trinity College-Hartford; Greg Wiedeman, University at Albany, SUNY; Elizabeth Carron, Boston College; Hillary Gatlin, Duke University ).

Who Else Is in That Video Meeting? Maybe a Hacker

Data Breach Today

But new research by Forescout illustrates that elementary security errors in one vendor's system could have allowed attackers to snoop on meetings and view sensitive documents Forescout Finds Serious Flaws in DTEN Conferencing Systems Video conferencing and collaboration systems are must-have tools for global companies.

Meet Team Hanzo: Sarah Kloser — Fearless Adventurer At Heart And Guide to Hanzo Customer Success

Hanzo Learning Center

ediscovery #TeamHanzo Meet Team Hanzo Hanzo HoldHanzo has a new team member whom I can’t wait to introduce. I recently had the opportunity to sit down with Sarah and get to know her. She’s a foodie, a traveler, and an adventurer at heart.

52

Feds, Tech Giants Meet to Coordinate 2020 Election Security

Data Breach Today

Facebook, Google, Microsoft and Twitter Discuss Information Sharing, Coordination Representatives from the U.S. intelligence establishment met with security officials of major social media and technology firms this week to help craft the nation's approach to securing the 2020 elections, including facilitating better information sharing and coordination

New Cisco Webex Meetings flaw allows attackers to impersonate users

Security Affairs

A flaw in Cisco Webex Meetings client for Windows could allow local authenticated attackers to gain access to sensitive information. A vulnerability in Cisco Webex Meetings client for Windows, tracked as CVE-2020-3347 , could be exploited by local authenticated attackers to gain access to sensitive information. The CVE-2020-3347 vulnerability is an information disclosure issue that affects versions of the Cisco Webex Meetings Desktop App for Windows releases earlier than 40.6.0.

INSPIRE 20 Podcast: Meet Vandana Verma, Founder of Infosec Girls

Micro Focus

INSPIRE 20 Podcast: Meet Vandana Verma, Founder of Infosec Girls Attracting and recruiting more women into tech has been an on-going challenge for some time.

55

Meet the Jamf Protect API

Jamf on EdTech

Jamf Protect's new API is built on a GraphQL language, which allows admins and InfoSec to query content from the Jamf Protect console as well as make modifications

56

Zoom Bombing Attack Hits U.S. Government Meeting

Threatpost

House Oversight Committee meeting was the latest victim of Zoom bombing, according to an internal letter. A recent U.S. Web Security coronavirus Privacy Security US government work from home zoom zoom security Zoom-bombing

Meet Perficient’s Chief Strategists: Bill Busch

Perficient Data & Analytics

Data & Analytics Digital Transformation Strategy API Management Artificial Intelligence (AI) Big Data Big Data Strategy Business Development Chief Strategist Cloud Data Cloud Data Warehouse data lakes Data Solutions data warehouse digital transformation IT Modernization machine data Meet Our Chief Strategists Organizational Change Management resource managementThrilling our clients with innovation and impact – it’s not just rhetoric.

Meet DoppelPaymer, BitPaymer's Ransomware Lookalike

Dark Reading

New ransomware variant DoppelPaymer was leveraged in campaigns against the City of Edcouch, Texas, and the Chilean Ministry of Agriculture

Regulatory Update: NAIC Fall 2020 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2020 National Meeting (Fall Meeting) December 3-9, 2020. This Sidley Update summarizes the highlights from this meeting in addition to interim meetings that were held during November in lieu of taking place during the Fall Meeting. 25 were originally exposed at the 2019 Fall National Meeting and are largely aimed at aligning related party and affiliate reporting under SAP with U.S.

Paper 65

Meeting the new challenges of digital evidence management

OpenText Information Management

This is only one source of potential evidence – along with … The post Meeting the new challenges of digital evidence management appeared first on OpenText Blogs.

Cisco fixed flaws in WebEx that allow ghost participants in meetings

Security Affairs

Cisco has addressed three flaws in Webex Meetings that would have allowed unauthenticated remote attackers to join ongoing meetings as ghost participants. “Malicious actors could abuse these flaws to become a ‘ghost’ joining a meeting without being detected.”

Making meetings work for you and your project

DXC

I can remember very clearly the worst meeting I was ever involved in. Leadership and Success Uncategorized Meetings program management project managementA “flagship” municipal project with the potential to bring world admiration to a city. This new project needed new IT systems. So 44 of us sat in a room together — architects, engineers, program and project managers, business analysts, change managers, release […].

IT 48

MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

The Last Watchdog

We met at Black Hat 2019 and had a wide ranging discussion about the complex challenges companies face meeting their end of the security burden, while using cloud services. It is a positive development that CASBs arose — and can be expected to continue innovating to help companies meet this challenge. Cloud Access Security Brokers – aka “caz-bees” — have come a long way in a short time.

Risk 161

7 RSA Takeaways: 'Human Element' Meets Covid-19 Concerns

Data Breach Today

Supply Chain, Zero Trust and Coronavirus Among Topics Dominating 2020 Conference RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over Covid-19 also dominated

Meet 'Egregor,' a New Ransomware Family to Watch

Dark Reading

Egregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment