Wed.Jun 05, 2024

article thumbnail

RSAC Fireside Chat: Seclore advances ‘EDRM’ by aligning granular controls onto sensitive data

The Last Watchdog

Digital rights management ( DRM ) has come a long way since Hollywood first recognized in the 1990s that it needed to rigorously protect digital music and movies. By the mid-2000s a branch called enterprise digital rights management ( EDRM ) cropped up to similarly protect sensitive business information. Today, businesses amass vast amounts of business-critical data – at a pace that’s quickening as GenAI takes hold.

article thumbnail

ISMG Editors: Opening Day Overview of InfoSec Europe 2024

Data Breach Today

Panel Discusses Trends in Ransomware, Application Security and Generative AI Information Security Media Group editors are live at InfoSecurity Europe Conference 2024 in London with an overview of opening-day activities and hot topics including the latest ransomware trends, software security, election security and artificial intelligence risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google

Elie

This case-study explores the effectiveness of virtual reality (VR) for diversity, equity, and inclusion (DEI) training through the lens of a custom VR application developped to train Google employees.

138
138
article thumbnail

Chinese South China Sea Cyberespionage Campaign Unearthed

Data Breach Today

Sophos Finds 3 Clusters of Activity Dating at Least to May 2023 A government agency in a country that has repeatedly clashed with China over Beijing's territorial ambitions in the South China Sea was the subject of a prolonged cyberespionage campaign that used previously undetected backdoors and partially overlaps with known Sino state threat actors.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Age of the Drone Police Is Here

WIRED Threat Level

A WIRED investigation, based on more than 22 million flight coordinates, reveals the complicated truth about the first full-blown police drone program in the US—and why your city could be next.

Privacy 138

More Trending

article thumbnail

Cisco addressed Webex flaws used to compromise German government meetings

Security Affairs

Cisco addressed vulnerabilities that were exploited to compromise the Webex meetings of the German government. In early May, German media outlet Zeit Online revealed that threat actors exploited vulnerabilities in the German government’s implementation of the Cisco Webex software to access internal meetings. In March, the German authorities admitted the hack by Russia-linked actors of a military meeting where participants discussed giving military support to Ukraine. “In early May 2024, Ci

article thumbnail

SecurityScorecard Accuses Vendor of Stealing Trade Secrets

Data Breach Today

Firm Claims Safe Security Competed Unfairly, Engaged in 'Skullduggery' SecurityScorecard accused Safe Security and former employee Mary Polyakova in a civil complaint of stealing confidential customer information and engaging in unfair competition. The lawsuit seeks to protect SecurityScorecard's trade secrets and recover monetary damages.

Security 264
article thumbnail

CNN, Paris Hilton, and Sony TikTok accounts hacked via DMs

Security Affairs

A vulnerability in the popular video-sharing platform TikTok allowed threat actors to take over the accounts of celebrities. Threat actors exploited a zero-day vulnerability in the video-sharing platform TikTok to hijack high-profile accounts. The vulnerability resides in the direct messages feature implemented by the platform, reported Forbes. The malware spreads through direct messages within the app and only requires the user to open a message.

Access 133
article thumbnail

Zyxel Releases Emergency Security Update for NAS Devices

Data Breach Today

Company Addresses Flaws in End-of-Life NAS Devices Networking solutions vendor Zyxel fixed critical vulnerabilities in end-of-life network-attached storage devices that allow remote code execution. It left two vulnerabilities allowing attacks by authenticated local attackers unpatched.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Zyxel addressed three RCEs in end-of-life NAS devices

Security Affairs

Zyxel Networks released an emergency security update to address critical vulnerabilities in end-of-life NAS devices. Zyxel Networks released an emergency security update to address three critical flaws in some of its NAS devices that have reached end-of-life. An attacker can exploit the vulnerabilities to perform command injection attacks and achieve remote code execution.

article thumbnail

Australian Mining Giant Confirms BianLian Ransomware Attack

Data Breach Today

News Comes on Heels of Treasury Forcing Chinese Investors to Divest BianLian Shares Australian mining giant Northern Minerals says cybercriminals stole sensitive corporate secrets from its systems not long after the government forced several Chinese investors to divest their shares in the company. The incident did not have a material impact on Northern's operations or systems.

Mining 241
article thumbnail

U.S. SEC Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Customer Information Amendments Adopted

Data Matters

On May 16, 2024, the U.S. Securities and Exchange Commission (SEC) adopted amendments to its Regulation S-P. These final amendments impose significant cybersecurity requirements for several SEC-registered entities and transfer agents registered with another appropriate regulatory agency, including with respect to these entities’ policies and procedures, incident response and notification procedures, and cybersecurity risk management.

Privacy 94
article thumbnail

George Kurtz: CrowdStrike Falcon Driving Cyber Consolidation

Data Breach Today

CrowdStrike CEO Says Market Embracing AI-Driven Security Platform for Consolidation George Kurtz said CrowdStrike's Falcon platform is leading the way in cybersecurity consolidation, with deals involving cloud, identity or SIEM doubling year-over-year. Customer are seeing significant cost savings and faster response times, which Kurtz said has solidified CrowdStrike's position.

Marketing 234
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

An American Company Enabled a North Korean Scam That Raised Money for WMDs

WIRED Threat Level

Wyoming’s secretary of state has proposed ways of “preventing fraud and abuse of corporate filings by commercial registered agents” in the aftermath of the scheme’s exposure.

article thumbnail

Balancing privacy and security in education: Jamf webinar

Jamf

This webinar for school Apple administrators shows innovative ways of maintaining school security standards without putting student data or privacy at risk.

article thumbnail

Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting Topics at Google Cloud NEXT

Thales Cloud Protection & Licensing

Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting Topics at Google Cloud NEXT madhav Thu, 06/06/2024 - 05:18 Thales and Google Cloud have worked together for years to develop cybersecurity solutions for Google Cloud and Google Workspace using sovereign controls to protect sensitive data. Once again, this year, Thales participated in Google Cloud’s annual conference, Google Cloud NEXT.

Cloud 62
article thumbnail

Reimagining Cyber podcast: 100 episodes strong

OpenText Information Management

Reimaging Cyber is 100 episodes old! To celebrate how far we have come, let’s take a look back at where it all started and how far we have come. The Reimaging Cyber podcast first launched in December 2020, with hosts Stan Wisseman and Rob Aragao interviewing a variety of guests about their unique perspectives and insights on different topics of cybersecurity.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Making sense of mobile security: requirements, considerations and strategies

Jamf

Discover strategies to secure your organization's mobile device fleet. Learn about security set up, attack prevention techniques, and threat hunting methods.

article thumbnail

RADEEMA lets data flow with paper-free processes

OpenText Information Management

In Morocco, the city of Marrakesh is home to almost a million people. With an area of approximately four square miles, hundreds of thousands of people across the city rely on the Régie Autonome de Distribution d'Eau et d'Electricité de Marrakech (RADEEMA) to deliver water and electrical power. As a public utility company, we are an integral part of our customers’ lives.

Paper 64
article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. Now What? appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related Stories Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk Citing Attacks On Small Utilities, Dragos Launches Community Defense

article thumbnail

Insights on AI and ISO 20022: OpenText helps shape the narrative at the Payments Canada Summit

OpenText Information Management

The 2024 Payments Canada Summit recently concluded, bringing together industry leaders, innovators, and key stakeholders to discuss the most recent trends and insights in payments. As a lead sponsor of the event, OpenText made a significant impact at this year’s event by hosting two highly anticipated speaking sessions and making significant contribution to the overarching narrative at the conference.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Prioritizing operational resiliency to reduce downtime in payments

IBM Big Data Hub

The average lost business cost following a data breach was USD 1.3 million in 2023, according to IBM’s Cost of a Data Breach report. With the rapid emergence of real-time payments, any downtime in payments connectivity can be a significant threat. This downtime can harm a business’s reputation, as well as the global financial ecosystem. For this reason, it’s paramount that financial enterprises support their resiliency needs by adopting a robust infrastructure that is integrate

article thumbnail

ONCD Urges Congress to Harmonize Cybersecurity Regulations

Data Breach Today

ONCD Director Harry Coker Calls on Congress to Improve Cybersecurity Reciprocity ONCD Director Harry Coker called on Congress to better harmonize cross-sector baseline cybersecurity requirements in regulated industries after years of federal and international guidance. Organizations told the White House the lack of harmonization hurts cybersecurity and business competitiveness.

article thumbnail

Online Privacy and Overfishing

Schneier on Security

Microsoft recently caught state-backed hackers using its generative AI tools to help with their attacks. In the security community, the immediate questions weren’t about how hackers were using the tools (that was utterly predictable), but about how Microsoft figured it out. The natural conclusion was that Microsoft was spying on its AI users, looking for harmful hackers at work.

Privacy 121
article thumbnail

Maximizing SaaS application analytics value with AI

IBM Big Data Hub

Software as a service (SaaS) applications have become a boon for enterprises looking to maximize network agility while minimizing costs. They offer app developers on-demand scalability and faster time-to-benefit for new features and software updates. SaaS takes advantage of cloud computing infrastructure and economies of scale to provide clients a more streamlined approach to adopting, using and paying for software.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.