Sat.Mar 31, 2018 - Fri.Apr 06, 2018

article thumbnail

Malaysia's Central Bank Blocks Attempted SWIFT Fraud

Data Breach Today

Following the Unauthorized Transfer Attempt, Philippines Alerts Its Banks Malaysia's central bank, Bank Negara Malaysia, says it detected and successfully blocked an attack that attempted to steal funds via fraudulent SWIFT interbank money-moving messages. The attack against BNM led the central bank of the Philippines to issue an alert to banks in that country.

IT 188
article thumbnail

Mark Zuckerberg refuses to step down or fire staff over Facebook 'mistakes'

The Guardian Data Protection

Founder says he takes full responsibility for data breaches and will not ‘throw anyone else under the bus’ Mark Zuckerberg has rejected calls for heads to roll at Facebook over the Cambridge Analytica scandal, saying that he takes full responsibility. Speaking after Facebook’s fullest statement yet about the data breach, which the company now says resulted in 87m profiles being extracted from the platform, Zuckerberg insisted he remained the correct person to run the company.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Steps to Mapping, Testing, and Implementing a Process

AIIM

This is an overview of what is involved when it comes to documenting how to automate your processes. Of course, the devil’s in the details, and certainly, this is not the only way, but after listening to and learning from hundreds of our industry’s best consultants and analysts (the benefit of producing so many webinars – I listen to them all), I think this is one approach for you to consider.

article thumbnail

How modern RIM professionals are staying relevant – Part 3

TAB OnRecord

In parts one and two of this blog post we discussed the importance of records management professionals getting involved in the early stages of the information lifecycle, and the need to convey RIM principles in terms of business outcomes. The final segment of this three-part post covers the skills needed by RIM professionals to be [.] Read More. The post How modern RIM professionals are staying relevant – Part 3 appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Panera Bread Data Leak Persisted For Eight Months

Data Breach Today

Database of Customer Information Left Exposed via Unauthenticated API Endpoint Panera Bread is warning that information on 10,000 customers has been inadvertently exposed. The data leak, however, persisted despite the company being alerted to the problem eight months ago, and there are signs that the victim tally may be much higher.

184
184

More Trending

article thumbnail

Belgian Privacy Commission Issues Guidance on Data Protection Impact Assessments Under the GDPR

Data Matters

On 28 February 2018, the Belgian Commission for the Protection of Privacy (the “Privacy Commission”) published a recommendation setting out its approach to Data Protection Impact Assessments (“DPIAs”), and in doing so published a “White List” and a “Black List” of processing operations, pursuant to the General Data Protection Regulation (“GDPR”). Organisations subject to the GDPR are required to assess whether they need to undertake a DPIA when undertaking new processing operations.

GDPR 92
article thumbnail

Thales Executives Speak to Press about UK Cybersecurity Developments

Thales Cloud Protection & Licensing

Thales eSecurity’s CTO Jon Geater and Peter Carlisle , Thales eSecurity’s VP of Sales, EMEA, were recently featured in major news outlets espousing their opinions about internet-connected devices and the new Cyber Security Export Strategy. Geater, on new UK IoT security guidelines. Earlier this month, the UK government announced guidelines to make internet-connected devices safer.

article thumbnail

Saks, Lord & Taylor Suffer Payment Card Data Breach

Data Breach Today

5 Million Payment Cards Apparently Stolen by the Carbanak Gang, aka JokerStash Department store chains Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor have suffered a data breach that apparently exposed details on 5 million payment cards. Cybersecurity firm Gemini Advisory says the JokerStash syndicate - aka Carbanak gang - is selling the stolen card data.

article thumbnail

AggregateIQ: the obscure Canadian tech firm and the Brexit data riddle

The Guardian Data Protection

Documents released last week shed more light on the puzzle of the company’s links to Cambridge Analytica ‘Find Christopher Wylie.” That instruction – 13 months ago – came from the very first ex-Cambridge Analytica employee I met. He was unequivocal. Wylie would have answers to the two questions that were troubling me most. He could tell me about Facebook.

Marketing 111
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches

WIRED Threat Level

Fin7, also known as JokerStash, Carbanak, and other names, is one of the most successful criminal hacking groups in the world.

Security 107
article thumbnail

Why risk assessments are essential for GDPR compliance

IT Governance

Any organisation that’s required to comply with the EU General Data Protection Regulation (GDPR) needs to conduct regular risk assessments. This isn’t just because the Regulation says so; it’s because risk assessments are an essential part of cyber security, helping organisations address an array of problems that, if left unchecked, could cause havoc.

GDPR 81
article thumbnail

Facebook: 87M Accounts May Have Been Sent To Cambridge Analytica

Data Breach Today

Social Networking Giant Also Says Malicious Actors Scraped Public Profiles Facebook says up to 87 million people may have had their personal details transferred to voter-profiling firm Cambridge Analytica. The figure includes 17 million people in nine countries outside the U.S., potentially intensifying regulator scrutiny of the social networking site.

179
179
article thumbnail

Facebook refuses to promise GDPR-style privacy protection for US users

The Guardian Data Protection

Firm working on version of EU data protection law but Mark Zuckerberg stops short of confirming all changes will apply to US users Facebook is rolling out stronger privacy protections to users ahead of the introduction of Europe’s General Data Protection Regulation (GDPR), but Mark Zuckerberg will not promise all future changes will apply to the company’s American users.

GDPR 99
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A 200-Year-Old Idea Offers a New Way to Trace Stolen Bitcoins

WIRED Threat Level

Cambridge researchers point to an 1816 precedent that could fundamentally change how "dirty" Bitcoins are tracked.

Security 108
article thumbnail

BS 31111: the new cyber security standard explained

IT Governance

Last month, a new British Standard was launched. BS 31111 is suitable for organisations of any type and size, and provides essential guidance for executive management to manage their cyber risk and resilience. Best-practice framework to implement a cyber security regime. Cyber security is often managed solely by IT departments but, to be truly successful, risks need to be addressed by the wider organisation – particularly executive management, who have a key role to play.

article thumbnail

Breaches Tied to Chat Network Provider

Data Breach Today

Delta, Sears, Kmart and Best Buy Breaches All Stem From Hack of Same Vendor A spate of payment card breaches at some of the most recognized U.S. brands has been blamed on the hacking of India-based chat network provider [24]7.ai that led to the infiltration of online chat portals for Delta, Sears, Best Buy, Kmart and perhaps others.

177
177
article thumbnail

Our data is valuable. Here's how we can take that value back | Francesca Bria

The Guardian Data Protection

Silicon Valley’s surveillance capitalism isn’t working. But Barcelona shows that citizens’ data can generate public value Tech firms are emerging as new feudal lords. They control essential digital infrastructures – in this case, data and artificial intelligence – which are crucial for political and economic activity. But it doesn’t have to be that way.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DC's Stingray Mess Won't Get Cleaned Up

WIRED Threat Level

DHS this week confirmed that Washington, DC is littered with fake cell tower surveillance devices, but nothing will likely be done to fix it.

IT 89
article thumbnail

Public Hearing on IoT Risks

Schneier on Security

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a public hearing to receive information from all interested parties about potential safety issues and hazards associated with internet-connected consumer products. The information received from the public hearing will be used to inform future Commission risk management work.

IoT 77
article thumbnail

Guilty Pleas in Criminal Insider Breach Case

Data Breach Today

Paper Records Stolen From Hospital Storage Unit Insiders with access to paper records can pose a serious fraud threat, as recent guilty pleas in an Oklahoma healthcare case illustrate. Experts offer advice on addressing the insider threat.

Paper 145
article thumbnail

Facebook suspects 300,000 Australians had data shared with Cambridge Analytica

The Guardian Data Protection

Chief technology officer reveals 87 million users worldwide had data harvested Facebook has admitted that the data of more than 300,000 Australians might have been “improperly shared” with Cambridge Analytica. The social media giant’s chief technology officer, Mike Schroepfer, published a statement overnight which revealed the data of up to 87 million people across the globe had been shared with the analytics firm, 37 million more than previously reported.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Upcoming webinar: Business Continuity Management: How to get started

IT Governance

Cyber attacks, natural disasters, power failures, industrial action and human error: these risks all have the potential to severely disrupt business operations and are often unpredictable. A growing body of legislation and the current cyber threat landscape has made organisations even more aware of the risks of cyber attacks, and the importance of being able to effectively respond to and recover from a business disruption.

Risk 74
article thumbnail

Alabama Becomes Final State to Enact Data Breach Notification Law

Hunton Privacy

On March 28, 2018, Alabama became the final state in the U.S. to enact a data breach notification law. The Alabama Data Breach Notification Act of 2018 (S.B. 318) (“the Law”) goes into effect on May 1, 2018. Key Provisions of the Alabama Data Breach Notification Act of 2018: The law applies to “covered entities” and their “third-party agents.” “Covered entity” is defined as “a person, sole proprietorship, partnership, government entity, corporation, nonprofit, trust, estate, cooperative associat

article thumbnail

Art Coviello on Fraud and the 2018 State of Security

Data Breach Today

RSA's Ex-CEO Opens up on Cybercrime and Social Media Risks Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.

article thumbnail

EU official seeks 'clear game plan' on social media and elections

The Guardian Data Protection

British commissioner wants more transparency and limits on harvesting data for political ends A senior EU official has called for action against internet companies that harvest personal data, as Brussels prepares to move against those spreading “fake news” following the Cambridge Analytica revelations. Sir Julian King, the European commissioner for security, wants “a clear game plan” on how social media companies are allowed to operate during political campaigns to be ready for the 2019 European

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

GDPR compliance for professional services firms: time to get on track

IT Governance

The General Data Protection Regulation (GDPR)’s compliance deadline is looming. Every organisation that processes personal data must be in compliance with the new law by 25 May or risk substantial regulatory fines from the Information Commissioner’s Office and legal action from aggrieved data subjects. If you haven’t already, your firm must start your compliance project straight away or risk being in non-compliance.

GDPR 75
article thumbnail

Analyzing Sucuri’s 2017 Hacked Website Trend Report

PerezBox

The Sucuri team just released their first annual security report – Hacked Website Report 2017. It uses a representative sample of infected websites from the Sucuri customer base to better. Read More. The post Analyzing Sucuri’s 2017 Hacked Website Trend Report appeared first on PerezBox.

article thumbnail

The Do's and Don'ts of Reporting to the Board

Data Breach Today

CISOs increasingly are summoned to present to their Boards of Directors. But too often these presentations fail to frame the right topics with the right metrics, says Jacob Olcott of BitSight. He offers advice for maximizing the opportunity in front of the Board.

124
124