Tue.Sep 05, 2023

article thumbnail

Zscaler Data Security Platform Takes on Symantec, CASB Tools

Data Breach Today

CEO Jay Chaudhry: In-Line Inspection, App-to-App Protection Aid Data Defense Growth Zscaler's ability to inspect traffic in-line and secure application-to-application communications has driven massive growth in its data protection business, CEO Jay Chaudhry said. Customers have embraced Zscaler's data protection technology over both incumbents like Symantec as well as CASB tools.

Security 296
article thumbnail

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road

The Last Watchdog

New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. Related: The need for supply chain security This is to be expected. After all, government mandates combined with industry standards are the twin towers of public safety. Without them the integrity of our food supplies, the efficacy of our transportation systems and reliability of our utilities would not be what they are.

IoT 220
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT28 Spear-Phishes Ukrainian Critical Energy Facility

Data Breach Today

Energy Facility Impeded Attack by Blocking the Launch of the Windows Script Host Ukrainian cyber defenders say Russian military hackers targeted a critical energy infrastructure facility with phishing emails containing a malicious script leading to cyberespionage. An energy facility cyber defender impeded the attack by blocking the launch of indows Script Host, CERT-UA says.

Phishing 289
article thumbnail

Mainframe and the cloud? It’s easy with open source

IBM Big Data Hub

This is part four in a five-part series on mainframe modernization. The secret to mainstreaming the mainframe into today’s modern, cloud-centric IT environments is to make the experience of working with the mainframe like the experience of working off the mainframe—especially the developer experience (DX). Historically, working on the mainframe was an entirely different experience from the distributed world.

Cloud 129
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

EU Artificial Intelligence Act Not a Panacea for AI Risk

Data Breach Today

Dutch Citizens 'Should Not Expect Miracles' From AI Act, Says Dutch Privacy Agency The Dutch privacy regulator says imminent artificial intelligence regulation in the European Union may fail to prevent the rollout of dangerous algorithms. Europe is close to finalizing the AI Act, but citizens of the Netherlands "should not expect miracles," the regulator said.

More Trending

article thumbnail

Why Tenable Is Eyeing Security Vendor Ermetic at Up to $350M

Data Breach Today

Ermetic Is in Line for a 9-Figure Deal Just 40 Months After Emerging From Stealth A startup founded by the longtime leader of Secdo and backed by the likes of Qumra Capital and Accel could soon be acquired by Tenable. The company is in advanced negotiations to purchase cloud infrastructure security startup Ermetic in a deal valued at between $300 million and $350 million.

Security 271
article thumbnail

Five Obstacles to IG Policy Approval

ARMA International

In the best circumstances, a well-crafted draft IG policy will sail through an approval process like a ship in warm water with strong breezes. Too often, though, the proposed policy hits an iceberg, which stops it in its tracks. At best, there’s little damage and the approval process can continue; at worst, the ship sinks and you head back to the drawing board.

article thumbnail

Feds Publicly Name 130 Healthcare Firms Using Web Trackers

Data Breach Today

FTC, HHS Warn Hospitals, Telehealth Firms of Privacy Violations With Tracker Use The Federal Trade Commission and the Department of Health and Human Services have publicly named 130 hospitals and telehealth companies that were recently warned that the use of online tracking tools in their websites or mobile apps potentially violates federal data privacy and security regulations.

article thumbnail

Hackers Target High-Privileged Okta Accounts via Help Desk

Dark Reading

Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization.

110
110
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Battery Ventures Buys GrammaTech's Application Security Unit

Data Breach Today

Research Services Business Will Keep GrammaTech Name, Five Points Capital Ownership GrammaTech has separated its security software products and cyber research services divisions, and venture capital firm Battery Ventures has acquired the former and renamed it CodeSecure. The Washington, D.C.-area application security testing software business will pursue M&A in adjacent markets.

Security 269
article thumbnail

Inconsistencies in the Common Vulnerability Scoring System (CVSS)

Schneier on Security

Interesting research : Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities Abstract: The Common Vulnerability Scoring System (CVSS) is a popular method for evaluating the severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric score between 0 and 10 is calculated, 10 being the most severe (critical) value.

Security 110
article thumbnail

Official Slams Aussie Firms for Data Breach Reporting Delays

Data Breach Today

Information Commissioner Urges Organizations to Accelerate Breach Notifications Australia's information commissioner has urged organifzations to quicken the process of notifying those affected by data breaches instead of spending months analyzing each incident. Angelene Falk said it can take anywhere from 20 days to five months to notify breach victims, putting them at risk.

article thumbnail

Why Marketing Compliance for Financial Services Is A Big Deal

Hanzo Learning Center

In today's fiercely competitive business landscape, financial services companies, like their counterparts in other industries, rely on advertising and digital marketing strategies to create brand recognition, promote their products and services to potential customers, and engage with their existing client base. According to a comprehensive market analysis conducted by Statista , digital advertising expenditures in the financial services sector in the United States surged to a staggering $21 bill

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Exploring the Boundless Possibilities of IoT: Connecting the World Through Smart Devices

Data Breach Today

Claro Enterprise Solutions' Kelly Rein on the Role of IoT Devices, AI-Based Video Scanning in Security Historically, IT and physical security teams have served in separate areas, but that is changing due to emerging threats such as a drone that landed on a firm's roof to steal data. Both teams need to be alerted to threats, said Kelly Rein, senior director of product at Claro Enterprise Solutions.

IoT 259
article thumbnail

Freecycle data breach impacted 7 Million users

Security Affairs

The nonprofit organization Freecycle Network (Freecycle.org) confirmed that it has suffered a data breach that impacted more than 7 million users. The Freecycle Network (TFN,) is a private, nonprofit organization that coordinates a worldwide network of “gifting” groups to divert reusable goods from landfills. The organization confirmed that it has suffered a data breach that impacted more than 7 million users In response to the incident, The Freecycle Network prompted users to reset

article thumbnail

Proactively Prepare for AI Regulation: Report

Data Breach Today

Mounting Regulation Will Add Complexity to Compliance, Says KPMG Regulatory scrutiny over artificial intelligence will only mount, warns consultancy KPMG in a report advising companies to proactively set up guardrails to manage risk. Even in the absence of regulatory regimes, "companies must proactively set appropriate risk and compliance guardrails.

article thumbnail

Hackers stole $41M worth of crypto assets from crypto gambling firm Stake

Security Affairs

Crypto gambling site Stake suffered a security breach, and threat actors withdrew $41M of funds stolen including Tether and Ether. Researchers reported abnormally large withdrawals made from the crypto gambling site Stake to an account with no previous activity, a circumstance that suggests that threat actors have hacked the platform and stolen crypto assets, including Tether and Ether.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Supporting cybersecurity in education

Jamf

Schools are a common target for cyber criminals trying to steal personal information. This blog discusses how schools can foster digital citizenship while defending students and their network from cyber threats.

article thumbnail

GhostSec Leaks Source Code of Alleged Iranian Surveillance Tool

Dark Reading

GhostSec has made the source code for what it calls a powerful surveillance tool openly available in a 26GB file, but FANAP denies its legitimacy.

IT 109
article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Major cybersecurity events in the last week make clear that hackers just keep getting savvier — and security teams need to be vigilant to keep up. Ransomware groups continue to exploit unpatched vulnerabilities. Remote code execution (RCE) vulnerabilities, such as those exploited by a pair of botnets, highlight the hazards of unpatched devices and the need for patch management.

article thumbnail

Russia Undertakes Disinformation Campaign Across Africa

Dark Reading

Following coups in some African nations, Russia is exploiting the instability with the manipulation of media channels to stoke anti-French sentiment, among other things.

99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Duress Buttons Can Save Lives in Schools

HID Global

HID’s wireless duress button is incorporated into a credit card-sized ID badge that integrates with emergency call systems and internal security systems.

article thumbnail

Data Initiatives Force Closer Partnership Between CISOs, CDOs

Dark Reading

Though security leaders and chief data officers both care about data management, their different missions have created a tension that needs addressing.

Security 104
article thumbnail

The Strange Afterlife of Wagner’s Yevgeny Prigozhin

WIRED Threat Level

Posts praising the Wagner Group boss following his death in a mysterious plane crash last month indicate he was still in control of his "troll farm," researchers claim.

article thumbnail

As LotL Attacks Evolve, So Must Defenses

Dark Reading

Because living-off-the-land (LotL) attacks masquerade as frequently used, legitimate companies, they are very difficult to block and detect.

108
108
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Improve enterprise security with three new Edge features

Collibra

We all know that security, the price of entry for applications that live within your company’s firewall, is crucial for data intelligent organizations. However, it can still pose numerous challenges and become a time consuming process. Security teams within your organization may require container security scans for images that are included in Edge.

article thumbnail

Researchers Discover Critical Vulnerability in PHPFusion CMS

Dark Reading

No patch is available yet for the bug, which can enable remote code execution under the correct circumstances.

CMS 95
article thumbnail

Managing your cloud ecosystems: Upgrading your cluster to a new version

IBM Big Data Hub

Planning and managing your cloud ecosystem and environments is critical for reducing production downtime and maintaining a functioning workload. In the “Managing your cloud ecosystems” blog series, we cover different strategies for ensuring that your setup functions smoothly with minimal downtime. In the second blog of the series, we’re discussing best practices for upgrading your clusters to newer versions.

Cloud 71