Fri.Sep 27, 2024

article thumbnail

How Today's Top CIOs Are Completing the Cloud Journey

Data Breach Today

Enterprise Browser: The Tool CIOs Never Knew They Were Lacking The enterprise browser is the tool CIOs never knew they were lacking - a seamless access method to the workloads, apps and data that moved to the cloud. It bakes in the needs of the enterprise. Learn why the enterprise browser is a strategic imperative to the success of your business.

Cloud 287
article thumbnail

The Tor Project and Tails have merged operations

Security Affairs

The Tor Project and Tails OS have joined forces and merged operations to counter a growing number of digital threats. The Tor Project and Tails have merged operations to enhance collaboration and expand training, outreach, and strengthen both organizations’ efforts to protect users globally from digital surveillance and censorship. The two organizations aim to better counter growing digital threats, and the merger between them will enhance protections for users needing both network and sys

Privacy 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Linux Distros Patching Printer Hijacking Flaw

Data Breach Today

Exploitation Requires Victim to Print On Rogue Printer Attackers can exploit a series of vulnerabilities in the OpenPrinting Common Unix Printing System utility to remotely execute arbitrary code on certain machines. Major Linux distributions reacted Friday by releasing patches. Exploitation requires a victim to attempt to print from a malicious device.

263
263
article thumbnail

NIST Recommends Some Common-Sense Password Rules

Schneier on Security

NIST’s second draft of its “ SP 800-63-4 “—its digital identify guidelines—finally contains some really good rules about passwords: The following requirements apply to passwords: lVerifiers and CSPs SHALL require passwords to be a minimum of eight characters in length and SHOULD require passwords to be a minimum of 15 characters in length.

Passwords 114
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Beyond Phishing: AI's New Tricks for Cyberattacks

Data Breach Today

Paramount's Surinder Lall on AI Impersonation, Deepfakes, AI Governance Frameworks While AI transforms business operations, it helps cybercriminals develop sophisticated impersonation techniques such as deepfakes and voice synthesis, posing new challenges for corporate security, said Surinder Lall, senior vice president of global information security risk management at Paramount.

Phishing 189

More Trending

article thumbnail

Meta Fined 91 Million Euros By The Irish DPC

Data Breach Today

Fine Is For 2019 Disclosure That Meta Stored User Passwords In Plaintext The Irish data regulator fined social media giant Meta 91 million euros after an investigation found the company insecurely stored passwords of millions of European Facebook and Instagram users. A Meta spokesperson said the company identified the problem in 2019 and took "immediate action.

Passwords 185
article thumbnail

The Data Breach Disclosure Conundrum

Troy Hunt

The conundrum I refer to in the title of this post is the one faced by a breached organisation: disclose or suppress? And let me be even more specific: should they disclose to impacted individuals, or simply never let them know? I'm writing this after many recent such discussions with breached organisations where I've found myself wishing I had this blog post to point them to, so, here it is.

article thumbnail

UK CMA Clears Amazon, Anthropic Partnership

Data Breach Today

The U.K. antitrust regulator called off an investigation into the March $4 billion deal between Amazon and artificial intelligence firm Anthropic. "Amazon’s partnership with Anthropic does not qualify for investigation under the merger provisions of the Enterprise Act 2002," the regulator said.

article thumbnail

A cyberattack on Kuwait Health Ministry impacted hospitals in the country

Security Affairs

The Kuwait Health Ministry is recovering from a cyberattack that disrupted systems at multiple hospitals and disabled the Sahel healthcare app. Kuwait’s Health Ministry was the victim of a cyberattack that took systems at several of the country’s hospitals offline. The cyber attack also impacted the Ministry of Health website, which is still offline, and Kuwait’s Sahel healthcare app. “Kuwaiti Health Ministry announced on Wednesday that many essential features are back and running after a

Insurance 131
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Tech Orgs Urge Targeted AI Regulations to Foster Innovation

Data Breach Today

Coalition of Leading Institutions Push for Policymakers to Develop Focused AI Rules A group of leading organizations across industries and technology giants is calling on lawmakers in the United States to develop focused regulations around artificial intelligence that limit the risks associated with emerging technologies while allowing innovation to flourish.

article thumbnail

U.S. Department of Commerce Issues Proposed Rule on ICTS Supply Chain for Connected Vehicles

Data Matters

On September 26, 2024, the U.S. Department of Commerce Bureau of Industry and Security (BIS) Office of Information and Communications Technology and Services (OICTS) published a long-awaited rule proposing to ban certain connected vehicles transactions involving hardware and software linked to the People’s Republic of China (China) and Russia. BIS also proposed extensive compliance obligations for importers and manufacturers of connected vehicles and related components, which come as the automot

article thumbnail

Healthcare Cyber Bill Calls for 'Corporate Accountability'

Data Breach Today

Senate Bill Would Mean Cyber Funding for Hospitals, Prison Time for Lying CEOs Two U.S. senators are proposing stricter cyber mandates for the healthcare sector. The bill provides funding to help hospitals adopt enhanced requirements, but lifts HIPAA enforcement fine caps and threatens executives with prison time for falsely attesting their organizations' compliance in audits.

article thumbnail

Tesla’s Cybertruck Goes, Inevitably, to War

WIRED Threat Level

A handful of Tesla’s electric pickup trucks are armed and ready for battle in the hands of Chechen forces fighting in Ukraine as part of Russia’s ongoing invasion. Can the EV take the heat?

Security 108
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

2024 threat hunter perspectives: Key insights from OpenText’s latest report

OpenText Information Management

In today’s evolving threat landscape, cyber defenders are constantly adapting to new adversarial tactics and emerging vulnerabilities. The latest 2024 Threat Hunter Perspective from OpenText sheds light on the most pressing threats, nation-state activities, and security recommendations enterprises must consider in the months ahead. Here are the key findings and expert insights to help you stay ahead of the curve.

Military 105
article thumbnail

Cyber vandalism on Wi-Fi networks at UK train stations spread an anti-Islam message

Security Affairs

UK police are investigating a cyberattack that disrupted Wi-Fi networks at several train stations across the country. U.K. transport officials and police are investigating a cyber attack on public Wi-Fi networks at the country’s biggest railway stations. Following the ‘cyber-security incident,’ passengers trying to log onto the Wi-Fi at several stations on Wednesday evening were displayed a page with the message “We love you, Europe,” followed by an anti-Islam message listing a serie

article thumbnail

A guide to building a successful data governance program

Collibra

A successful data governance program must align with the business’ strategic goals and have the ability to operationalize processes, people and technology to deliver outcomes. A repeatable operational process is important to help the program continuously improve with each iteration. Why keep reinventing the wheel and repeating the same mistakes when one can make the wheel better and bigger, ensuring trusted data that allows the business to innovate?

article thumbnail

U.S. sanctioned virtual currency exchanges Cryptex and PM2BTC for facilitating illegal activities

Security Affairs

The U.S. government sanctioned the virtual currency exchanges Cryptex and PM2BTC for facilitating cybercrime and money maundering. The U.S. government sanctioned two cryptocurrency exchanges, Cryptex and PM2BTC, and indicted a Russian national for allegedly facilitating cybercriminal activities and money laundering. The authorities believe that these exchanges facilitate the laundering of proceeds from cybercrime. “The Justice Department today announced actions coordinated with the Departm

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

From Tetris to Minecraft: The Evolution of Security Awareness into Human Risk Management

KnowBe4

Once upon a time, security awareness training resembled a never-ending game of Tetris. Threats cascaded down, demanding swift action and strategy, only to speed up until we inevitably faltered.

article thumbnail

Google shuts down WearOS update that was soft-bricking Pixel watches

Collaboration 2.0

Most users were able to install Wear OS 5 successfully, but an unlucky few ended up with blank screens after attempting to update.

98
article thumbnail

Louis Coiffait-Gunn: 100 days at CILIP

CILIP

100 days at CILIP – Louise Coiffait-Gunn shares his thoughts CILIP Chief Executive Louis Coiffait-Gunn looks back on his first one hundred days, revealing highlights from a busy schedule that has already taken in conferences, awards, and a general election. From ‘first impressions’ to ‘what next’, Louis shares his thoughts on CILIP and asks YOU to let us know your thoughts on what we should be focusing on.

article thumbnail

Your KnowBe4 Fresh Content Updates from September 2024

KnowBe4

Check out the 40 new pieces of training content added in September, alongside the always fresh content update highlights, events and new features.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Have a Windows 10 PC that can't be upgraded? You have 5 options before support ends next year

Collaboration 2.0

Microsoft will officially end support for its most popular operating system in 2025. Here's what you should do with your Windows 10 PCs that fail Microsoft's Windows 11 compatibility tests before that day arrives.

IT 76
article thumbnail

Privacy and Apple: What’s New in 2024

Jamf

When Apple introduces new operating systems, privacy is at the forefront. What’s coming to Apple’s newest operating systems like macOS Sequoia, iOS 18 and iPadOS 18, continue to improve Apple’s stance on privacy. For organizations managing and securing Apple at work, privacy is not only paramount for your users, but also for your organizational data.

Privacy 75
article thumbnail

Google's hidden AI tool turns your text into stunningly lifelike podcasts - for free. Listen for yourself

Collaboration 2.0

I've been studying AI for years, and Google's new AI podcast tool still astonishes me. Seriously, you have to hear this to believe it. But humans will beat the machines in the end. Here's why.

IT 76
article thumbnail

Cross-Sector Partnership puts Libraries at the nexus of health and digital literacy

CILIP

Cross-Sector Partnership puts Libraries at the nexus of health and digital literacy CILIP facilitated communication and collaboration in the Health and Digital literacy partnership that brought together NHS England, Arts Council England, and Libraries Connected. The Health and Digital Literacy Partnership launched with two cohorts of pilot projects that explored different approaches to improving health and digital literacy.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Listen: Google's hidden AI tool turns your text into stunningly lifelike podcasts - for free

Collaboration 2.0

I've been studying AI for years, and Google's new AI podcast tool still astonishes me. Seriously, you have to hear this to believe it. But humans will beat the machines in the end. Here's why.

IT 76
article thumbnail

Squid Fishing in Japan

Schneier on Security

Fishermen are catching more squid as other fish are depleted. Blog moderation policy.

81
article thumbnail

Worried about that critical RCE Linux bug? Here's why you can relax

Collaboration 2.0

Yes, there are security holes in OpenPrinting CUPS, which Linux, Chrome OS, MacOS, and some Unix systems use for printing, but it's not that bad. Here's how to check if you're at risk.

Risk 75