Mon.Nov 27, 2023

article thumbnail

Udderly Insecure: Researchers Spot Cow-Tracking Collar Flaws

Data Breach Today

IoT Hackers Could Inject Data to Fool 'Smart' Farmers and Vets About Animal Welfare Not even dairy cows appear to be safe from internet of things flaws, researchers report after reverse-engineering health-monitoring collars for cows and finding they could eavesdrop on and alter data. Once addressed by the manufacturer, they said the non-updateable collars would have to be replaced.

IoT 311
article thumbnail

GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

The Last Watchdog

In cybersecurity, keeping digital threats at bay is a top priority. A new ally in this battle is robotic process automation (RPA.) This technology promises to simplify tasks, boost accuracy and quicken responses. Related: Gen-A’s impact on DevSecOps Robotic process automation is about getting repetitive, rule-based tasks done with the help of software robots , often called “bots.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US, UK Cyber Agencies Spearhead Global AI Security Guidance

Data Breach Today

Global Cybersecurity Agencies Say 'Secure by Design' Is Key to AI Threat Mitigation Nearly two dozen national cybersecurity organizations on Sunday urged AI developers to embrace "secure by design" and other preventive measures aimed at keeping hackers out from the mushrooming world of AI systems. The United Kingdom and United States spearheaded its development.

Security 311
article thumbnail

Ukraine’s intelligence service hacked Russia’s Federal Air Transport Agency, Rosaviatsia

Security Affairs

Ukraine’s intelligence service announced the hack of the Russian Federal Air Transport Agency, ‘Rosaviatsia.’ Ukraine’s intelligence service announced they have hacked Russia’s Federal Air Transport Agency, ‘Rosaviatsia.’ The attack is the result of a complex special cyber operation. “The Defence Intelligence of Ukraine informs that as a result of a successful complex special operation in cyberspace, a large volume of confidential documents of the

Military 138
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Welltok's MOVEit Hack Affects Nearly 8.5 Million, So Far

Data Breach Today

About 2 Dozen Welltok Health Plan Clients Affected in File Transfer Software Hack The tally of individuals whose health data was compromised in a hack on MOVEit file transfer software used by Welltok, a provider of online wellness resources to dozens of health plans, has soared to nearly 8.5 million. The hack is among the biggest health data breaches reported so far this year.

More Trending

article thumbnail

How Biden's AI Executive Order Will Affect Healthcare

Data Breach Today

President Joe Biden's recent executive order for artificial intelligence encourages investment in AI while setting a vision for a regulatory framework to address issues involving AI technology safety, bias and other concerns in healthcare, said attorney Wendell Bartnick of the law firm Reed Smith.

article thumbnail

Section 702 Surveillance Reauthorization May Get Slipped Into ‘Must-Pass’ NDAA

WIRED Threat Level

Congressional leaders are discussing ways to reauthorize Section 702 surveillance, including by attaching it to the National Defense Authorization Act, Capitol Hill sources tell WIRED.

IT 129
article thumbnail

Hospital Chain Hit With Ransomware Attack

Data Breach Today

Ardent Health Services Operates 30 Hospitals, 200 Other Care Facilities in 6 States Tennessee-based Ardent Health Services, which operates dozens of hospitals and other healthcare facilities in several states, said on Monday that it is dealing with a ransomware attack that has forced the entity to divert some patients and cancel or reschedule certain procedures.

article thumbnail

Secret White House Warrantless Surveillance Program

Schneier on Security

There seems to be no end to warrantless surveillance : According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected of any crime, including victims.

Mining 122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How Generative AI Will Reshape the Financial Services Sector

Data Breach Today

Wipro Americas 2 CEO Suzanne Dann on How Generative AI Can Address Risk, Compliance Generative AI can improve operational efficiencies, enhance risk and compliance and elevate the client experience for financial services firms, said Wipro's Suzanne Dann. Wipro embraced generative AI to reduce fraud by spotting anomalous behavior and used synthetic data to test deep learning models.

article thumbnail

California Privacy Protection Agency Publishes Draft Regulations on Automated Decisionmaking Technology

Hunton Privacy

On November 27, 2023, the California Privacy Protection Agency (“CPPA”) published its draft regulations on automated decisionmaking technology (“ADMT”). The regulations propose a broad definition for ADMT that includes “any system, software, or process—including one derived from machine-learning, statistics, or other data-processing or artificial intelligence—that processes personal information and uses computation as whole or part of a system to make or execute a decision or facilitate human de

Privacy 121
article thumbnail

Zscaler Taps Generative AI to Measure Risk, Predict Breaches

Data Breach Today

Zscaler Brings Generative AI to Data Protection Bundles, Debuts Standalone AI Tools Zscaler infused generative AI features into its data protection bundles and is introducing AI-powered products that quantify risk and predict breaches, said CEO Jay Chaudhry. The cloud security firm enhanced its data protection policies for AI/ML apps and tools to lower the likelihood of data loss.

Risk 236
article thumbnail

Initial Access Broker Activity Doubles in One Year’s Time

KnowBe4

New data sheds light on just how active the Initial Access Broker (IAB) business is, and the growth uncovered doesn’t bode well for potential victim organizations.

Access 115
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Harnessing AIOps for IT Operations and Management

Data Breach Today

Gartner's Padraig Byrne on Data Challenges and Operational Excellence IT leaders are poised to employ AIOps to combat the challenges faced by ITOps teams due to vast data volumes, alert fatigue and task prioritization. AIOps can potentially revolutionize IT operations, streamline alert management, and enhance overall reliability by combining AI and ML.

IT 192
article thumbnail

General Electric, DARPA Hack Claims Raise National Security Concerns

Dark Reading

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

Sales 122
article thumbnail

Revealing our Ethics and Values

CILIP

Advocacy, values and ethics - making a case for library services David McMenemy. Photo: SLIC © Alan Richardson Pix-AR.co.ukDavid McMenemy. Photo: SLIC © Alan Richardson Pix-AR.co.uk A new piece of work to support advocacy work in libraries has put ethics and values at the heart of those conversations. Senior Lecturer in Information Studies at University of Glasgow, Dr David McMenemy, created the REVEAL toolkit and here he explains how to make best use of it, and why it is needed.

article thumbnail

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Dark Reading

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

Privacy 97
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How better key management can close cloud security gaps troubling US government (Part 1 of 2)

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government (Part 1 of 2) sparsh Tue, 11/28/2023 - 05:20 Bruce Schneier recently blogged : A bunch of networks, including US Government networks , have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key.

Cloud 83
article thumbnail

Cyber Threats to Watch Out for in 2024

Dark Reading

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key.

Cloud 83
article thumbnail

Huntress Finds Business Email Compromise (BEC) Increases In Q3, 2024

KnowBe4

Huntress has released a report finding that business email compromise (BEC) attacks have risen in the third quarter of 2023.

article thumbnail

CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines

Dark Reading

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

IBM watsonx AI and data platform, security solutions and consulting services for generative AI to be showcased at AWS re:Invent

IBM Big Data Hub

According to a Gartner® report , “By 2026, more than 80% of enterprises will have used generative AI APIs or models, and/or deployed GenAI-enabled applications in production environments, up from less than 5% in 2023.”* However, to be successful they need the flexibility to run it on their existing cloud environments. That’s why we continue expanding the IBM and AWS collaboration, providing clients flexibility to build and govern their AI projects using the watsonx AI and

Cloud 71
article thumbnail

Ardent Health Hospitals Disrupted After Ransomware Attack

Dark Reading

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

article thumbnail

Blazor State Management: Best Practices To Consider

Enterprise Software Blog

When we talk about Blazor, state is an essential part of any app that you build with a framework that includes user interaction. Consider a scenario where a user must log in to view sensitive data. However, because the state is not properly managed, they must log in again and again each time they reload the page. How likely are they to continue using the application in the future?

article thumbnail

Balancing Simplicity and Security in the Digital Experience

Dark Reading

New data shows consumer preferences for security in digital experiences and indicates ways businesses can best protect digital identity in today's digital world.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

HHS’ Office for Civil Rights Settles HIPAA Investigation of St. Joseph’s Medical Center for Disclosure of Patients’ Protected Health Information to a News Reporter

IG Guru

U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights November 20, 2023 HHS’ Office for Civil Rights Settles HIPAA Investigation of St. Joseph’s Medical Center for Disclosure of Patients’ Protected Health Information to a News Reporter St. Joseph’s Medical Center provided a national media outlet access to COVID-19 patients’ protected health information Today, […] The post HHS’ Office for Civil Rights Settles HIPAA Investigation of St.

Access 75
article thumbnail

Angular 17 Control Flow: Elevate Your Development Experience

Enterprise Software Blog

I'm excited to share that you can enhance your Angular development experience within Ignite UI for Angular components by embracing the new block template syntax for optimized, built-in control flow. This powerful feature simplifies your code, improves type checking, reduces bundle size, and boosts performance. So now, let's dive into some code samples to see the syntax in action!

article thumbnail

Drive efficiency in manufacturing with mobile technology for deskless workers.

Jamf

Innovative manufacturers are empowering workers with mobile technology, one of the ways to boost productivity in your deskless workforce. To better understand the roadmap to success, Jamf insiders share what manufacturers need to think about when they introduce mobile devices to their employees.