Card-Not-Present Fraud Costs Mount

Data Breach Today

A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident

Card-Not-Present Fraud Growth: No End in Sight?

Data Breach Today

Card-not-present fraud will cost retailers worldwide $130 billion between 2018 and 2023, a new report from Juniper Research predicts. Steffen Sorrell, author of the study, explains the reasons behind this growth projection and describes what can be done to improve the fight against fraud

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

At the BLACK HAT EUROPE 2018 held in London the duo presented the tool and confirmed that Toyota plans to share the specifications on Github and will start selling the fully built system in Japan.

Researchers presented an improved version of the WPA KRACK attack

Security Affairs

Now the experts presented a new variant of the attack technique at the Computer and Communications Security (CCS) conference. The post Researchers presented an improved version of the WPA KRACK attack appeared first on Security Affairs.

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

Expert presented a new attack technique to compromise MikroTik Routers

Security Affairs

The experts at Tenable Research presented the technique on October 7 at DerbyCon 8.0 The post Expert presented a new attack technique to compromise MikroTik Routers appeared first on Security Affairs.

Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

Security Affairs

Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. The post Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol appeared first on Security Affairs.

Baltimore SharePoint User's Group Presentation

JKevinParker

Get the slides from my presentation on "Don't Make Me Think: Getting SharePoint to be Useful, Usable, and Used": Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used from Kevin Parker, CIP. Presentation SharePointLast night I had the privilege of speaking at the Baltimore SharePoint User's Group. I really enjoyed the interaction with these professionals.

A few hours after Apple released iOS 12.1, a researcher presented a Passcode Bypass issue

Security Affairs

a researcher presented a Passcode Bypass issue appeared first on Security Affairs. A few hours after Apple released iOS 12.1 the iPhone bug hunter Jose Rodriguez has found a new passcode bypass issue that could be exploited to see all contacts’ private information on a locked iPhone.

e-Records Conference 2018: Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies, universities or local governments), vendors and subject matter experts from various organizations to share both their challenges and successes with managing electronic records.

2019 Conference Call for Presentations – NAID/PRISM (i-SIGMA)

IG Guru

If you have an idea for a session that would benefit those in the secure data destruction or records information management industries or an interest in presenting at the 2019 conference, now is the time to act. Answer the Call for Presentations: Suggest […].

Blockchain Technology: SEC Commissioner Peirce Presents an Opportunity to Rethink Regulation

Data Matters

Digital asset trading platforms present novel regulatory considerations for secondary trading and custody. The post Blockchain Technology: SEC Commissioner Peirce Presents an Opportunity to Rethink Regulation appeared first on Data Matters Privacy Blog. On February 8, 2019, U.S.

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. Hong Kong, 16.11.2018 – Group-IB, an international company that specializes in preventing cyber attacks, presented the findings of its latest Hi-Tech Crime Trends 2018 report at the FinTech Security Conference in Hong Kong organized by Binary Solutions Limited in partnership with Group-IB.

Contract data presents a unique GDPR challenge

Information Management Resources

Getting into compliance with the new rules will require a governance policy and framework that specifically addresses the unique challenges of information contained in contracts. GDPR Compliance Compliance systems

5 top challenges the IoT presents to data transparency

Information Management Resources

There are several pressing issues related to the IoT and data transparency practices. These problems concern both businesses and consumers using IoT devices. Internet of things Data management Data strategy

Merging Time: Past & Present Combined

Archives Blogs

This year, there are nineteen of these past-and-present combined images adorning the gallery walls. Once suitable present-day shots have been taken, they are manipulated to match the focal length and angle of the original photographs.

@CMSummit - My Presentation

John Battelle's Searchblog

Opening Slides by John Battelle, Monday June 7 View more presentations from CM Summit: Marketing in Real Time. PS - all the presentations are available on our CM Summit channel here Here's the deck I used to open the CM Summit yesterday. Enjoy!

Jamf After Dark podcast: Past, present and future

Jamf

The Jamf podcast gives you an inside look at the people, teams and processes that make Jamf what it is. See what episodes we launched in 2018 and what you can expect in 2019

Analytics experts discuss AI's present and future

IBM Big Data Hub

Where is AI headed? How should you be thinking about AI? What should you be doing with AI? To answer these questions, we recently convened a round table of tech influencers to discuss some of the most burning issues arising from AI — starting with why we should think of it as “augmented intelligence” rather than “artificial intelligence

@CMSummit - Mary Meeker's Internet Trends Presentation

John Battelle's Searchblog

The most tweeted Slideshare of the show so far is Mary's presentation. Internet Trends 2010 by Morgan Stanley Research View more presentations from CM Summit: Marketing in Real Time Here it is for your reading pleasure!

How to protect your digital privacy from new Christmas presents

The Guardian Data Protection

Just unwrapped a gift of an internet-connected device? Don’t just turn it on and plug it in – you might be giving the manufacturer all sorts of information you don’t need to Jeff Bezos knows when you’ve been sleeping, he knows when you’re awake, he knows when you’ve been bad or good, because you didn’t change the default privacy settings on the Amazon smart speaker you set up in your bedroom, for goodness’ sake.

The past, present and future of data warehouse appliances

IBM Big Data Hub

The IBM Integrated Analytics System (IIAS), is a unique, cloud-ready appliance and machine learning platform wields the power of an in-memory, massively parallel processing database engine with embedded Spark.

Connected Cars Present Great Opportunity for Car Rental Companies

Perficient Data & Analytics

telematics) has been around for some time, but only recently has the car rental industry truly exploited the massive opportunity it presents. Similar to mobility, connected car technology (e.g., The Internet of Things (IoT) has allowed companies to leverage new technology that better manages their fleets of cars. It’s also helping businesses, such as those that rent trucks for construction and landscaping, to closely monitor the performance and safety of their vehicles and drivers.

GDPR presents perfect opportunity to rethink data architecture

Information Management Resources

The new mandate truly creates an opportunity to restrategize and modernize systems by unifying the view or access to data assets and enforcing stricter guidelines for data protection. GDPR Data architecture Data privacy Data security

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018. If you are interested in presenting or being a panelist, please complete the online form, Presentation Proposal Submission Form. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Presentation formats could include 1-2 presenters or 3-4 panelists for 45 or 75-minute sessions.

The Future of War (From Jan., 1993 to the Present)

John Battelle's Searchblog

( image is a shot of my copy of the first Wired magazine, signed by our founding team ). I just read this NYT piece on the United States’ approach to unmanned warfare: Do Drones Undermine Democracy?

Articles and Presentations

ChiefTech

I'm still in the process of migrating content from my old blog - for a consolidated list of my articles, presentations and papers please see this page

European Commission Presents EU-U.S. Privacy Shield

Hunton Privacy

On February 29, 2016, the European Commission issued the legal texts that will implement the EU-U.S. Privacy Shield. These texts include a draft adequacy decision from the European Commission, Frequently Asked Questions and a Communication summarizing the steps that have been taken in the last few years to restore trust in transatlantic data flows. The agreement in support of the new EU-U.S. transatlantic data transfer framework, known as the EU-U.S.

Bulgarian Presidency Presents Progress Report and Points for Debate on ePrivacy

Hunton Privacy

On June 8, 2018, the Council of the European Union’s Bulgarian Presidency presented a progress report (the “Report”) on the draft ePR to the Transport, Telecommunications and Energy Council. The Report reflects on the amendments presented in the May 2018 Examination of the Presidency text. On January 10, 2017, the EU Commission adopted a proposal for a Regulation on Privacy and Electronic Communications (“ePR”).

Catch up with web archiving presentations from Portland

Archive-It

Formal presentations, breakout discussions, and hallway conversations surveyed the broad landscape of web archiving use cases, partner types, and their respective challenges; from the mandates that shape collecting scopes to the technical developments that unlock future access and use possibilities.

Conferencia “Archivos: Herencia de pasado, gestión de presente, compromiso de futuro"

Archives Blogs

El Cine York fue escenario para la conferencia organizada entre el municipio de Vicente López y la Comisión Documental de la Ciudad denominada “Archivos: Herencia de pasado, gestión de presente, compromiso de futuro”.

UK Government Expected to Present Data Protection Bill in September 2017

Hunton Privacy

Media sources have reported that the UK Department for Culture, Media & Sport has confirmed its plans to present its Data Protection Bill to Parliament when MPs return to Parliament in early September. The Bill follows commitments made in the Queen’s Speech in June, and will effectively copy the EU General Data Protection Regulation (“GDPR”) into the UK statute book.

GDPR 54

PacSec presentation

Scary Beasts Security

My recent PacSec presentation (with Billy Rios), entitled "Cross-domain leakiness", is now online. You can view it via this link. There's a new way to attack SSL-enabled web apps in there ("Cookie Forcing"); a bunch of serious browser cross-domain thefts (many not yet disclosed); and attacks against the paranoid one window / one tab browsing model. The slides by themselves are a little sketchy on detail.

Rosemary Jay Presents at UK House of Lords Sub-Committee Meeting

Hunton Privacy

On March 1, 2017, Hunton & Williams senior consultant attorney Rosemary Jay presented evidence on the data protection reform package and the impact of Brexit to the UK Parliament’s House of Lords EU Home Affairs Sub-Committee meeting. . The committee asked the presenters to respond to questions regarding the implications for UK businesses, data controllers and data subjects, particularly in light of Brexit.

GDPR 40

How to Plan a Successful Information Management Solution Implementation

JKevinParker

At the 2016 Information Governance Conference , I presented on "How to Plan a Successful Information Management Solution Implementation". InfoGovCon Information Coalition Presentation Project ManagementGet my slide deck from SlideShare. Related: Check out my Reflections on the 2016 InfoGovCon. Summary Start with information strategy, architecture, and governance. Recruit an executive champion and cross-departmental partners. Partner with your IT organization.

Threat Modeling in 2018: Attacks, Impacts and Other Updates

Adam Shostack

Conferences presentations threat modelingThe slides from my Blackhat talk, “ Threat Modeling in 2018: Attacks, Impacts and Other Updates ” are now available either as a PDF or online viewer.

Square 9 Presents 3rd Consecutive Encompass End User & Reseller Conference Encompass 2018 Offers Insight and Best Practices for Latest Innovations in Content Management

Document Imaging Report

Reseller and End User communities will gain exclusive insight into Square 9’s product innovation strategy, with a significant focus on the new Solutions Delivery Network being presented at this event. NEW HAVEN, CONN., October 3, 2018 – Square 9® Softworks welcomes its dedicated dealer channel and their customers back to Encompass 2018, an exclusive information management conference delivering three days of intuitive education, networking, and idea sharing.

Puget Sound Energy achieves award-winning content management and customer engagement

OpenText Information Management

Enterprise Content Management customer communications management customer story customer video Data Archiving Document Presentment Extended ECM PSE SAPWhat happens when you successfully modernize customer communications and deliver a centralized SAP-integrated content management solution? You create a superior customer experience, improve business productivity, and win an OpenText™ Elite™ Award for SAP Integration Excellence!

Free Virtual Information Symposium 8/18

JKevinParker

Watch the promo video: Information Coalition PresentationMy friends at Information Coalition are putting on a FREE Information Symposium on August 18. Register here for FREE: [link].

Video 52

Latin American ‘Biñeros’ Bond Over Fraudulent Purchase Scheme

Threatpost

A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible. Vulnerabilities Web Security banking identification numbers bineros card fraud card not present e-commerce Fraud latin america online checkout spanish language streaming