Fri.Apr 26, 2024

article thumbnail

Health Analytics Firm Reports Breach Affecting 1.1 Million

Data Breach Today

Data Stolen via Breach of Reliable Networks - BerryDunn's Managed Service Provider A Maine consulting firm with a medical data analytics business must notify more than 1 million Americans that hackers stole their information from company servers. Which clients of Berry, Dunn, McNeil & Parker - and by extension, their customers - have been affected by the breach isn't clear.

Analytics 216
article thumbnail

Kaiser Permanente data breach may have impacted 13.4 million patients

Security Affairs

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals in the United States. Kaiser Permanente is an American integrated managed care consortium, it is made up of three distinct but interdependent groups of entities: the Kaiser Foundation Health Plan, Inc. (KFHP) and its regional operating subsidiaries; Kaiser Foundation Hospitals; and the regional Permanente Medical Groups.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rubrik Execs on How Going Public Will Drive More Innovation

Data Breach Today

Why Cyber's First IPO Since 2021 Will Fuel Growth, Foster Customer Relationships After Rubrik became the first cybersecurity IPO since September 2021, company co-founder and CTO Arvind Nithrakashyap and CPO Anneka Gupta said Rubrik remain focused on cyber resilience, with investments focused on fostering long-term customer relationships and expanding the company's capabilities.

article thumbnail

Long Article on GM Spying on Its Cars’ Drivers

Schneier on Security

Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.

Insurance 108
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

FTC Finalizes Health Breach Notification Rule Update

Data Breach Today

Regs Now Cover Wearables and Health Apps, Extend to More Types of Breaches The Federal Trade Commission has finalized changes to its Health Breach Notification Rule, expanding the type of technologies that apply to regulations pertaining to non-HIPAA-regulated entities. The rule has been on the books for about 15 years, but the agency only recently began to enforce it.

IT 164

More Trending

article thumbnail

Microsoft Releases New-Open Source Tool for OT Security

Data Breach Today

ICSpector Is Now on GitHub, Scans PLCs, Extracts Info and Detects Malicious Code Microsoft has released a new open-source security tool to close gaps in threat analysis for industrial control systems and help address increased nation-state attacks on critical infrastructure. ICSpector, available on GitHub, can scan PLCs, extract information and detect malicious code.

Security 164
article thumbnail

Next Week is World Password Day!

KnowBe4

May 2nd is World Password Day. Despite the computer industry telling us for decades that our passwords will soon be gone, we now have more than ever!

Passwords 102
article thumbnail

Tech Titans, AI Leaders Join New Federal AI Security Board

Data Breach Today

Heads of OpenAI, Microsoft, Alphabet Join Inaugural AI Safety and Security Board The heads of technology giants Alphabet and Microsoft and leading artificial intelligence firm OpenAI are joining a federal AI safety and security board aimed at securing U.S. critical infrastructure against emerging AI risks, the Department of Homeland Security announced Friday.

article thumbnail

US Justice Department Accuses Iranian Nationals of Launching Spear Phishing Attacks

KnowBe4

The US Department of Justice has indicted four Iranian nationals for allegedly launching spear phishing attacks against the US government and defense contractors. In one instance, the hackers compromised over 200,000 employee accounts at a victim organization.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

State AGs, Industry Groups Urge Action in Change Health Saga

Data Breach Today

Calls for More Aid to Providers Come as Parent Company UHG Grapples With Breach Twenty-two state attorneys general and some industry groups are urging Change Healthcare's parent company and regulators to be transparent and give more financial aid to providers as the firm recovers from a highly disruptive cyberattack and the industry braces for massive breach notifications.

154
154
article thumbnail

How an Athletic Director Exploited AI to Frame a Principal with Fabricated Racist Comments

KnowBe4

In an unsettling turn of events, a high school athletic director in Maryland is accused of using artificial intelligence (AI) in a morally horrible manner.

article thumbnail

Strengthening Asset Management, Security in Rail Transport

Data Breach Today

CISO Tom Remberg on Enhancing Rail Passenger Experience While Beefing Up Security As railways embrace digital transformation, the industry faces unique security challenges. Tom Remberg, CISO of Bane Nor, the agency responsible for Norway’s railway infrastructure, shared strategies to mitigate risks associated with digital change in the rail sector.

article thumbnail

Cryptocurrencies and cybercrime: A critical intermingling

Security Affairs

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement in this sector Cryptocurrencies have revolutionized the financial world, offering new investment opportunities and decentralized transactions. However, as cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement in this sector.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Thoma Bravo to Buy Cybersecurity AI Firm Darktrace for $5.3B

Data Breach Today

PE Firm Tried to Take Darktrace Private in Summer 2022, But Couldn't Agree on Terms Private equity giant Thoma Bravo agreed to buy Darktrace for $5.32 billion just 19 months after deal talks between the two sides fell apart. The take-private deal would accelerate Darktrace's organic growth and allow it to pursue acquisitions and leverage Thoma Bravo's operational best practices.

article thumbnail

Your KnowBe4 Fresh Content Updates from April 2024

KnowBe4

Check out the 33 new pieces of training content added in April, alongside the always fresh content update highlights, events and new features.

article thumbnail

Jamf Educator gets streamlined updates

Jamf

We recently made significant updates to the Jamf Educator platform, introducing a redesigned landing page that guides users‘ journey from Learn to Grow to Share.

article thumbnail

Supabase Storage: now supports the S3 protocol via Supabase

IG Guru

Check out the article here. The post Supabase Storage: now supports the S3 protocol via Supabase first appeared on IG GURU.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Support for Jamf Admin will be discontinued with the release of Jamf Pro 11.6.0

Jamf

Jamf began communicating the deprecation of Jamf Admin in the Jamf Pro 10.44 release notes. However, the day has come for Jamf Admin to say farewell. What does that mean for you? Read on to find out more.

article thumbnail

Supporting Professional Registration: Maureen Pinder

CILIP

CILIP Copyright COnference 2024 By Maureen Pinder, Faculty Librarian, J. B. Priestley Library, University of Bradford. ¬¬ Professional Registration Support Officers (PRSO) play a vital role in helping CILIP members navigate their way to Certification, Chartership and Fellowship. They are part of a network of support that is available to Professional Registration candidates at all levels.

article thumbnail

How Today’s Workplace Caters to the EV Surge

HID Global

Enhance workplace perks with electric vehicle charging stations to attract talent. Learn how RFID technology enhances security and supports ESG goals today.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Network security architecture is a strategy that provides formal processes to design robust and secure networks. Effective implementation improves data throughput, system reliability, and overall security for any organization. This article explores network security architecture components, goals, best practices, frameworks, implementation, and benefits as well as where you can learn more about network security architecture.

Security 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bigger isn’t always better: How hybrid AI pattern enables smaller language models

IBM Big Data Hub

As large language models (LLMs) have entered the common vernacular, people have discovered how to use apps that access them. Modern AI tools can generate, create, summarize, translate, classify and even converse. Tools in the generative AI domain allow us to generate responses to prompts after learning from existing artifacts. One area that has not seen much innovation is at the far edge and on constrained devices.

Cloud 92
article thumbnail

Friday Squid Blogging: Searching for the Colossal Squid

Schneier on Security

A cruise ship is searching for the colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.