Fri.Apr 26, 2024

article thumbnail

Health Analytics Firm Reports Breach Affecting 1.1 Million

Data Breach Today

Data Stolen via Breach of Reliable Networks - BerryDunn's Managed Service Provider A Maine consulting firm with a medical data analytics business must notify more than 1 million Americans that hackers stole their information from company servers. Which clients of Berry, Dunn, McNeil & Parker - and by extension, their customers - have been affected by the breach isn't clear.

Analytics 157
article thumbnail

Kaiser Permanente data breach may have impacted 13.4 million patients

Security Affairs

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals in the United States. Kaiser Permanente is an American integrated managed care consortium, it is made up of three distinct but interdependent groups of entities: the Kaiser Foundation Health Plan, Inc. (KFHP) and its regional operating subsidiaries; Kaiser Foundation Hospitals; and the regional Permanente Medical Groups.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rubrik Execs on How Going Public Will Drive More Innovation

Data Breach Today

Why Cyber's First IPO Since 2021 Will Fuel Growth, Foster Customer Relationships After Rubrik became the first cybersecurity IPO since September 2021, company co-founder and CTO Arvind Nithrakashyap and CPO Anneka Gupta said Rubrik remain focused on cyber resilience, with investments focused on fostering long-term customer relationships and expanding the company's capabilities.

article thumbnail

Cryptocurrencies and cybercrime: A critical intermingling

Security Affairs

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement in this sector Cryptocurrencies have revolutionized the financial world, offering new investment opportunities and decentralized transactions. However, as cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement in this sector.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FTC Finalizes Health Breach Notification Rule Update

Data Breach Today

Regs Now Cover Wearables and Health Apps, Extend to More Types of Breaches The Federal Trade Commission has finalized changes to its Health Breach Notification Rule, expanding the type of technologies that apply to regulations pertaining to non-HIPAA-regulated entities. The rule has been on the books for about 15 years, but the agency only recently began to enforce it.

IT 144

More Trending

article thumbnail

Microsoft Releases New-Open Source Tool for OT Security

Data Breach Today

ICSpector Is Now on GitHub, Scans PLCs, Extracts Info and Detects Malicious Code Microsoft has released a new open-source security tool to close gaps in threat analysis for industrial control systems and help address increased nation-state attacks on critical infrastructure. ICSpector, available on GitHub, can scan PLCs, extract information and detect malicious code.

Security 144
article thumbnail

Long Article on GM Spying on Its Cars’ Drivers

Schneier on Security

Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.

article thumbnail

Tech Titans, AI Leaders Join New Federal AI Security Board

Data Breach Today

Heads of OpenAI, Microsoft, Alphabet Join Inaugural AI Safety and Security Board The heads of technology giants Alphabet and Microsoft and leading artificial intelligence firm OpenAI are joining a federal AI safety and security board aimed at securing U.S. critical infrastructure against emerging AI risks, the Department of Homeland Security announced Friday.

article thumbnail

US Justice Department Accuses Iranian Nationals of Launching Spear Phishing Attacks

KnowBe4

The US Department of Justice has indicted four Iranian nationals for allegedly launching spear phishing attacks against the US government and defense contractors. In one instance, the hackers compromised over 200,000 employee accounts at a victim organization.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

State AGs, Industry Groups Urge Action in Change Health Saga

Data Breach Today

Calls for More Aid to Providers Come as Parent Company UHG Grapples With Breach Twenty-two state attorneys general and some industry groups are urging Change Healthcare's parent company and regulators to be transparent and give more financial aid to providers as the firm recovers from a highly disruptive cyberattack and the industry braces for massive breach notifications.

144
144
article thumbnail

How an Athletic Director Exploited AI to Frame a Principal with Fabricated Racist Comments

KnowBe4

In an unsettling turn of events, a high school athletic director in Maryland is accused of using artificial intelligence (AI) in a morally horrible manner.

article thumbnail

Strengthening Asset Management, Security in Rail Transport

Data Breach Today

CISO Tom Remberg on Enhancing Rail Passenger Experience While Beefing Up Security As railways embrace digital transformation, the industry faces unique security challenges. Tom Remberg, CISO of Bane Nor, the agency responsible for Norway’s railway infrastructure, shared strategies to mitigate risks associated with digital change in the rail sector.

article thumbnail

Next Week is World Password Day!

KnowBe4

May 2nd is World Password Day. Despite the computer industry telling us for decades that our passwords will soon be gone, we now have more than ever!

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Thoma Bravo to Buy Cybersecurity AI Firm Darktrace for $5.3B

Data Breach Today

PE Firm Tried to Take Darktrace Private in Summer 2022, But Couldn't Agree on Terms Private equity giant Thoma Bravo agreed to buy Darktrace for $5.32 billion just 19 months after deal talks between the two sides fell apart. The take-private deal would accelerate Darktrace's organic growth and allow it to pursue acquisitions and leverage Thoma Bravo's operational best practices.

article thumbnail

Support for Jamf Admin will be discontinued with the release of Jamf Pro 11.6.0

Jamf

Jamf began communicating the deprecation of Jamf Admin in the Jamf Pro 10.44 release notes. However, the day has come for Jamf Admin to say farewell. What does that mean for you? Read on to find out more.

article thumbnail

Supporting Professional Registration: Maureen Pinder

CILIP

CILIP Copyright COnference 2024 By Maureen Pinder, Faculty Librarian, J. B. Priestley Library, University of Bradford. ¬¬ Professional Registration Support Officers (PRSO) play a vital role in helping CILIP members navigate their way to Certification, Chartership and Fellowship. They are part of a network of support that is available to Professional Registration candidates at all levels.

article thumbnail

Your KnowBe4 Fresh Content Updates from April 2024

KnowBe4

Check out the 33 new pieces of training content added in April, alongside the always fresh content update highlights, events and new features.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Jamf Educator gets streamlined updates

Jamf

We recently made significant updates to the Jamf Educator platform, introducing a redesigned landing page that guides users‘ journey from Learn to Grow to Share.

article thumbnail

How Today’s Workplace Caters to the EV Surge

HID Global

Enhance workplace perks with electric vehicle charging stations to attract talent. Learn how RFID technology enhances security and supports ESG goals today.

article thumbnail

Supabase Storage: now supports the S3 protocol via Supabase

IG Guru

Check out the article here. The post Supabase Storage: now supports the S3 protocol via Supabase first appeared on IG GURU.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Network security architecture is a strategy that provides formal processes to design robust and secure networks. Effective implementation improves data throughput, system reliability, and overall security for any organization. This article explores network security architecture components, goals, best practices, frameworks, implementation, and benefits as well as where you can learn more about network security architecture.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Bigger isn’t always better: How hybrid AI pattern enables smaller language models

IBM Big Data Hub

As large language models (LLMs) have entered the common vernacular, people have discovered how to use apps that access them. Modern AI tools can generate, create, summarize, translate, classify and even converse. Tools in the generative AI domain allow us to generate responses to prompts after learning from existing artifacts. One area that has not seen much innovation is at the far edge and on constrained devices.

Cloud 44
article thumbnail

Friday Squid Blogging: Searching for the Colossal Squid

Schneier on Security

A cruise ship is searching for the colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.