Mon.Nov 04, 2024

article thumbnail

True Stories in InfoGov: Being “Good Cop” Isn’t Enough

Weissman's World

Good Cop needs Bad Cop to overcome information governance inertia; otherwise, there’s no meaningful personal incentive for anyone to do anything. As when a mother of a certain era would say to the kids, “Just wait ’til your father gets home!” The post True Stories in InfoGov: Being “Good Cop” Isn’t Enough appeared first on Holly Group.

article thumbnail

Top Financial, Cyber Experts Gathering for ISMG's NYC Summit

Data Breach Today

Nov. 7 Summit to Confront the Next Generation of Financial Cyber Risks ISMG’s 2024 Financial Services Cybersecurity Summit kicks off Thursday in New York City, bringing together industry leaders and cyber experts to explore critical defense strategies, including digital identity protection, SecOps transformation and realistic threat simulations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

One third of consumers would prefer working with AI agents for faster service

Collaboration 2.0

Many consumers are happy to communicate with an AI agent but also want to know when that conversation is happening.

article thumbnail

How to Evaluate Enterprise Browser Vendors

Data Breach Today

Assess Your Organization's Needs for Manageability and Efficiency Features Choosing the right enterprise browser requires evaluating its security, productivity, manageability and efficiency features to ensure that it meets your enterprise's needs on all these dimensions. Part 1 addresses security and productivity, and Part 2 covers manageability and efficiency.

Security 273
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Upgrade to Microsoft Office Pro and Windows 11 Pro for 87% off

Collaboration 2.0

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $53 for a limited time.

Access 111

More Trending

article thumbnail

Is your air fryer spying on you? Concerns over ‘excessive’ surveillance in smart devices

The Guardian Data Protection

UK consumer group Which? finds some everyday items including watches and speakers are ‘stuffed with trackers’ Air fryers that gather your personal data and audio speakers “stuffed with trackers” are among examples of smart devices engaged in “excessive” surveillance, according to the consumer group Which? The organisation tested three air fryers, increasingly a staple of British kitchens, each of which requested permission to record audio on the user’s phone through a connected app.

article thumbnail

UK Banks Urged to Gird for CrowdStrike-Like Outage

Data Breach Today

Regulator Tells Regulators to Enhance Third-Party Service Security British financial institutions must ensure by this spring that they could reasonably weather a third party tech outage on the scale of July's global meltdown of 8.5 million computers triggered by a faulty update from cybersecurity firm CrowdStrike.

article thumbnail

Nigerian man Sentenced to 26+ years in real estate phishing scams

Security Affairs

Nigerian Kolade Ojelade gets 26 years in U.S. for phishing scams that stole millions by hacking email accounts. A Nigerian national was sentenced to 26 years in prison in the US for stealing millions by compromising the email accounts of real estate businesses. The Nigerian national, Kolade Ojelade, Kolade Akinwale Ojelade (34), a resident of Leicester (UK) was sentenced to 26 years in U.S. for phishing scams that resulted in the compromise of millions of email accounts. “A Nigerian man wa

article thumbnail

Police Doxing of Criminals Raising Ransomware-Attack Stakes

Data Breach Today

Incident Responders Say Disruptions Help, See No Spike in Median Ransom Payments For anyone dreaming of law enforcement agencies arresting ransomware bigwigs, or intelligence agencies taking them out with drone strikes, keep on hoping. But here's good news: ransom payments haven't skyrocketed, as disruptions by law enforcement appear to be having an impact.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How Netscape lives on: 30 years of shaping the web, open source, and business

Collaboration 2.0

Netscape, the browser that launched the web revolution, was a cultural phenomenon. While the company is long gone, it helped create today's tech world.

IT 105
article thumbnail

SEC Moves to Get Foreign Testimony in SolarWinds Fraud Case

Data Breach Today

Testimony Request Targets Cybersecurity Concerns Raised by Ex-SolarWinds Engineer In its fraud case against SolarWinds, the SEC is pursuing testimony from former SolarWinds engineer Robert Krajcir - who lives in the Czech Republic - to address claims of lax cybersecurity practices. SolarWinds - which is also representing Krajcir - has until Friday to respond to the SEC's motion.

article thumbnail

Inside the Massive Crime Industry That’s Hacking Billion-Dollar Companies

WIRED Threat Level

When you download a piece of pirated software, you might also be getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that’s fueling some of the biggest breaches on the planet.

article thumbnail

Bypassing ChatGPT Safety Guardrails, One Emoji at a Time

Data Breach Today

Mozilla Researcher Uses Non-Natural Language to Jailbreak GPT-4o Anyone can jailbreak GPT-4o's security guardrails with hexadecimal encoding and emojis. A Mozilla researcher demonstrated the jailbreaking technique, tricking OpenAI's latest model into generating python exploits and malicious SQL injection tools.

Security 181
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How the 2024 US presidential election will determine tech's future

Collaboration 2.0

The two candidates have starkly different approaches to regulation and privacy. Here's what each administration could mean for the industry and individuals.

Privacy 103
article thumbnail

ABB Smart Building Software Flaws Invite In Hackers

Data Breach Today

Proof of Concepts Available for Cylon Aspect Energy Management Software Vulnerabilities in a smart building energy management system including an easily exploitable, two-year-old flaw that hasn't been widely patched could let hackers take over instances misconfigured to allow internet exposure. The flaws affect Cylon Aspect software from electrical engineering firm ABB.

166
166
article thumbnail

Celebrating 5 Million Learners: The Evolution of KnowBe4's Compliance Plus

KnowBe4

When you think of KnowBe4, you might immediately picture phishing simulations, password security modules, or other security awareness training topics.

article thumbnail

I tested the iPad Mini 7 for a week, and its the ultraportable tablet to beat at $100 off

Collaboration 2.0

Apple's iPad Mini 7 is an iterative upgrade to the small-sized tablet, but you probably shouldn't buy it for the AI features yet.

IT 105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

July 2024 ransomware attack on the City of Columbus impacted 500,000 people

Security Affairs

The July 2024 ransomware attack that hit the City of Columbus, Ohio, exposed the personal and financial data of 500,000 individuals. On July 18, 2024, the City of Columbus, Ohio, suffered a cyber attack that impacted the City’s services. On July 29, 2024, the City published an update on the City’s website and confirmed that the City of Columbus suffered a ransomware attack.

article thumbnail

3 ways to stop Android apps running in the background - and why I always do

Collaboration 2.0

I make sure to regularly - and manually - stop apps from running in the background on my Android phone. Is that absolutely necessary? Maybe not, but my habit does ensure optimal resources and privacy. Try it yourself.

Privacy 122
article thumbnail

If Social Engineering Is 70% - 90% of Attacks, Why Aren’t We Acting Like It?

KnowBe4

Over a decade ago, I noticed that social engineering was the primary cause for all malicious hacking. It has been that way since the beginning of computers, but it took me about half of my 36-year career to realize it.

IT 72
article thumbnail

Perplexity AI offers election results tracker and voter resource - try it here

Collaboration 2.0

The Election Information Hub aims to aggregate data about the US elections, but its AI has already gotten some facts wrong. Here's what to know.

IT 128
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

How Organisations Are Failing to Process Personal Data Lawfully Under the GDPR

IT Governance

Problems with consent, purpose limitation, retention periods, and more At the heart of the GDPR (General Data Protection Regulation) lie the Article 5 data protection principles. When I asked data privacy trainer and DPO (data protection officer) Andy Snow which principle organisations are most prone to getting wrong, he found it hard to pick just one.

article thumbnail

Raspberry Pi is getting a new touchscreen display - and I love the upgrades

Collaboration 2.0

The new Raspberry Pi Touch Display 2 is arguably the best (and easiest) way to give your system more utility. Here's what's new.

98
article thumbnail

The Role of Secrets Management in Securing Financial Services

Thales Cloud Protection & Licensing

The Role of Secrets Management in Securing Financial Services madhav Tue, 11/05/2024 - 04:30 Secrets management is one of the top DevOps challenges. According to 2024 Thales Global Data Threat Report: Financial Services , FinServ organizations face greater security challenges in securing cloud infrastructure and focus on locking down secrets in development operations.

article thumbnail

Linux Lite just got a useful AI feature for desktop - and it's more subtle than you think

Collaboration 2.0

Linux Lite is a lightweight distribution aimed at reviving older desktops, and with the latest release, the developers have (sort of) added AI into the mix.

IT 93
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Metal Tech MFG optimizes its B2B integration and EDI automation capabilities 

OpenText Information Management

For more than three decades, Metal Tech MFG has been precision-machining components for many of the world’s best-known agricultural machinery brands. We work with large enterprises with manufacturing facilities all over the world—and when we receive an order, we strive to deliver high-quality products on time, every time. Because we work with tight timelines for manufacturing and delivery, communication is key.

B2B 59
article thumbnail

Google is ending Android Auto support for older phones. Here's why (and the simple fix)

Collaboration 2.0

After announcing the change earlier this year, Google is officially enforcing the new requirements to run the in-car software on devices running Android 8.

93
article thumbnail

Sophos Versus the Chinese Hackers

Schneier on Security

Really interesting story of Sophos’s five-year war against Chinese hackers.

89