Fri.Oct 04, 2024

article thumbnail

Cloud Assumptions and Misconfigurations Threaten Healthcare Security

Data Breach Today

Common Cloud Assumptions and Takeaways for Healthcare Organizations As healthcare providers migrate their infrastructure and services to the cloud, they gain benefits such as increased flexibility, scalability and optimized patient data access and sharing. But misconceptions about cloud security are jeopardizing the security of electronic patient health information.

Cloud 265
article thumbnail

Advisor to the CJEU Confirms GDPR Fines For Subsidiary Infringements Should Reflect Group Turnover

Data Matters

On 12 September 2024, Advocate General Medina issued their Opinion in Case C-383/23 in which they confirmed that supervisory data protection authorities must, when calculating the fine for a GDPR infringement committed by a subsidiary, take into account the total annual turnover of the entire group—a concept known as parental liability. The post Advisor to the CJEU Confirms GDPR Fines For Subsidiary Infringements Should Reflect Group Turnover appeared first on Data Matters Privacy Blog.

GDPR 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Illumio, ColorTokens, Cisco Lead Microsegmentation Rankings

Data Breach Today

Illumio, Akamai Stay Atop Forrester Wave, While ColorTokens, Cisco Join Leaderboard Illumio and Akamai remained atop Forrester's microsegmentation rankings, while ColorTokens and Cisco climbed into the leader space.The microsegmentation market has expanded beyond traditional on-premises networks to address modern public cloud workloads.

Marketing 237
article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

perfctl malware targets misconfigured Linux servers to deploy cryptocurrency miners and proxyjacking software in an ongoing campaign. Aqua Nautilus researchers shed light on a Linux malware, dubbed perfctl malware, that over the past 3-4 years targeted misconfigured Linux servers. The malicious code was used to drop cryptocurrency miners and proxyjacking software.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

ISMG Editors: Russian Cybercrime Syndicates Under Siege

Data Breach Today

Also: U.S. Healthcare Cyber Bill, Insights from ISMG's Canada Summit In the latest weekly update, ISMG editors discussed recent international law enforcement efforts against Russian cybercrime organizations, the latest U.S. cybersecurity bill aimed at protecting the healthcare sector and key takeaways from ISMG's Canada Summit.

More Trending

article thumbnail

Medical Group Pays $240K Fine for 3 Ransomware Attacks

Data Breach Today

Nonprofit Group Hit 3 Times in 3 Weeks in 2018, Affecting PHI of 85,000 Patients Federal regulators have hit a California physician services organization with a $240,000 HIPAA civil penalty following an investigation into three ransomware attacks that occurred within a three-week span in early 2018, compromising the sensitive information of 85,000 patients.

article thumbnail

This Video Game Controller Has Become the US Military’s Weapon of Choice

WIRED Threat Level

After decades of relying on buttons, switches, and toggles, the Pentagon has embraced simple, ergonomic video-game-style controllers already familiar to millions of potential recruits.

article thumbnail

Mass Retail Hacks Affect Adobe Commerce and Magento Stores

Data Breach Today

4,387 Online Merchants Compromised, Including Cisco and National Geographic Stores Thousands of online stores running Adobe Commerce and Magento software have been hacked since the summer and infected with digital payment skimmers by attackers targeting a vulnerability known as CosmicSting. While patched by Adobe in June, users also need to forcibly invalidate stolen credentials.

Retail 221
article thumbnail

I bought the Google Pixel 9 Pro, and its most impressive feature was not the software

Collaboration 2.0

Google's Pixel 9 Pro is a brilliant piece of technology, but the software isn't what makes this entry in the series stand out for me.

IT 90
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Security Needs to Be Simple and Secure By Default: Google

Data Breach Today

Google Pushes for Gen AI and Platformization to Counter Sophisticated Threats Google asserts that platformization and consolidation can help contain today's sophisticated threats. Embedding generative AI into security is also required as the industry moves from assisted AI to semi-autonomous and, eventually, to autonomous security, with the goal of security by default.

Security 224
article thumbnail

The 4 biggest challenges of AI-generated code that Gartner left out of its latest report

Collaboration 2.0

Gartner says AI will require 80% of developers to upskill, but that's not the whole story. From buggy AI code to endless revisions, here's what wasn't mentioned in the report.

IT 98
article thumbnail

Ex-CEO Adam Geller Returns to Product Leadership at Zscaler

Data Breach Today

Former Exabeam CEO Aims to Strengthen Data-Driven Strategy for Security Operations Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.

Security 205
article thumbnail

The most immersive speaker system I've ever tested is now on sale at Best Buy

Collaboration 2.0

The SteelSeries Arena 9 can connect with up to three devices simultaneously, making it an excellent choice for multi-use media spaces. And it's on sale now during Best Buy's competing Prime Day event.

Sales 75
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Russia Arrests 100 in Cryptex Crypto Exchange Crackdown

Data Breach Today

US-Sanctioned Crypto Exchange Founder Sergey Ivanov Included in Sweeping Arrests Russia’s primary federal investigative agency announced a rare and sweeping investigation into the United States-sanctioned cryptocurrency exchange Cryptex and other platforms used to carry out illegal transactions and launder millions from ransomware groups.

article thumbnail

Buy 3 months of Xbox Game Pass Ultimate for 28% off, here's how

Collaboration 2.0

Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.

75
article thumbnail

Irish DPC Probes Ryanair Over Facial Recognition

Data Breach Today

Company Has Long Running Fight Against Fare Scrappers The Irish data regulator launched an investigation into Dublin-based ultra low-cost carrier Ryanair to identify potential privacy violations related to the company's use of third-party facial recognition technology, stepping into a running fight Ryainair has fought against online ticket sellers.

Privacy 184
article thumbnail

Facebook will show you more content from outside your friends list (but that might not be a bad thing)

Collaboration 2.0

Several new features are coming to Facebook, and they may help you explore your local community more.

94
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Ivanti Confirms Exploitation of an Old Critical Vuln

Data Breach Today

Remote Code Execution Bug Exploited in Limited Attacks Ivanti confirmed that hackers are exploiting an SQL injection vulnerability in its Ivanti Endpoint Manager enabling remote code execution, despite the company addressing the issue with a patch in May. The flaw allows unauthenticated attackers within the same network to execute arbitrary code.

IT 163
article thumbnail

One of the best entry-level portable batteries I've tested is $100 off for October Prime Day

Collaboration 2.0

If you're looking for a lightweight, portable battery that'll get you out of a pinch without breaking the bank, check out the EcoFlow River 3, especially at only $159 ahead of October Prime Day.

74
article thumbnail

Meta Hit Again With Targeted Advertising Limits In Europe

Data Breach Today

European Court of Justice Says Meta May Not Indefinitely Retain User Data Targeted advertising may face additional restrictions following a ruling by the top European Union court that social media giant Meta cannot indefinitely retain user data. Nor can it use data for advertising "without distinction as to type of data," the European Court of Justice said Friday.

IT 163
article thumbnail

Amazon Prime Day: Best 125+ deals live ahead of October's Big Deal Days sale

Collaboration 2.0

October Prime Day may not officially start until next week, but our deal-hunting experts have found the best early Prime Day deals live now on TVs, laptops, phones, and more.

Sales 74
article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

Apple iOS 18.0.1 and iPadOS 18.0.1 fix media session and passwords bugs

Security Affairs

Apple released iOS 18.0.1 update that addressed two vulnerabilities that exposed passwords and audio snippets to attackers. Apple released iOS 18.0.1 and iPadOS 18.0.1 updates to fix two vulnerabilities, respectively tracked as CVE-2024-44207 and CVE-2024-44204. The company addressed the vulnerability by improving checks. The flaw was reported by Michael Jimenez and an anonymous researcher.

article thumbnail

Best Prime Day laptop deals to shop in October 2024

Collaboration 2.0

We're gearing up for next week's Amazon's October Prime Day, but there are some sweet deals live right now, including a sale on Apple's MacBook Pro, and laptops from Asus, Lenovo, HP and more.

Sales 72
article thumbnail

Infostealer Threat Group “Marko Polo” Evolving Into an “Empire”

KnowBe4

Detailed research by Recorded Future's threat research division, Insikt Group on the threat group Marko Polo demonstrates just how advanced the group’s.

69
article thumbnail

I tested a 'luxury' nugget ice maker, and it was amazing - and it's on sale for Prime Day

Collaboration 2.0

The GE Opal 2.0 is a premium ice maker with all the smarts to make it an exceptionally satisfying kitchen appliance. Get it for 18% off ahead of October Prime Day.

IT 75
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Financial Services Industry Experiences a Massive Increase in Brand Abuse

KnowBe4

Industry analysis of the domains used behind phishing and brand impersonation attacks show financial institutions are being leveraged at an alarming rate.

article thumbnail

Lenovo's excellent IdeaPad 3i is about to be $300 off at Walmart - and I don't expect the deal to last

Collaboration 2.0

The mid-range Lenovo IdeaPad 3i laptop is dropping down to just $479 at the big-box retailer during its Holiday Deals sale next week, almost $300 off the original price.

Retail 74
article thumbnail

Migrate EWS Apps to Microsoft Graph for Exchange Online in D365 Finance and Operations

Ascent Innovations

Migrate EWS Apps to Microsoft Graph for Exchange Online in D365 Finance and Operations Exchange Web Services (EWS) is a legacy protocol that has been in use since Exchange Server 2007. In August 2018, Microsoft announced that there won’t be any active investment in EWS APIs for Exchange Online. We recommend that you migrate your EWS apps that access Exchange Online to Microsoft Graph.

Access 52