May, 2018

article thumbnail

Blockchain Unchained - Discovering its Potential in Information Management

AIIM

Blockchain is the hot topic of the IT industry – the explosive and rapid growth of BitCoin has taken the obscure technology of distributed ledgers into mainstream consciousness. But the question we want to ask is “ Does Blockchain have a role to play in Information Management? Does it have a role beyond cryptocurrencies? ”. The short answer to that question is yes, and it could become one of the most important innovations for our industry in decades.

article thumbnail

List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked

IT Governance

Remember when I said last month that “with the GDPR less than a month away I imagine future lists will be even longer thanks to the introduction of mandatory data breach notifications”? Well, May’s list of incidents is very long, and the GDPR only came into effect at the end of the month. If I were a cynic I might think that some breached organisations were seeking to keep their exposure to regulatory fines to a minimum by rushing to report historic incidents before the GDPR – and its enhanced p

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Legacy Content Migration: Urgent Need is Largely Invisible

Weissman's World

Fun fact: an estimated 75% of today’s content management solutions were installed before the year 2010 – meaning that most organizations are now depending upon systems that at best are dated, and at are worst dangerously close end-of-life. This being the case, you’d think that folks would be working hard to move their legacy content […]. The post Legacy Content Migration: Urgent Need is Largely Invisible appeared first on Holly Group.

article thumbnail

Cambridge Analytica Shuts Down Amid Ongoing Facebook Crisis

WIRED Threat Level

The troubled data firm, which improperly accessed the data of up to 87 million Facebook users, has ceased operations.

Access 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Crabby Ransomware Nests In Compromised Websites

Data Breach Today

Cisco Warns of Dangers of Running Vulnerable Web Applications The Gandcrab ransomware has been a moving target. Since it was discovered in January, it quickly became one of the most widely distributed file-encrypting malware programs. Researchers with Cisco say they've now found it seeded within legitimate websites, making its spread tougher to stop.

More Trending

article thumbnail

FBI Seizes Domain Controlling 500,000 Compromised Routers

Data Breach Today

Sinkholing Should Help Mitigate 'VPN Filter' Outbreak At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has reportedly sinkholed the control domain for the router botnet, which should help contain the potential damage.

189
189
article thumbnail

Most GDPR emails unnecessary and some illegal, say experts

The Guardian Data Protection

Many firms have the required consent already; others don’t have consent to send a request The vast majority of emails flooding inboxes across Europe from companies asking for consent to keep recipients on their mailing list are unnecessary and some may be illegal, privacy experts have said, as new rules over data privacy come into force at the end of this week.

GDPR 112
article thumbnail

Technical Writing Tips for IT Professionals

Lenny Zeltser

This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills. To print it, use the one-page PDF version; you can also customize the Word version of the document. General Recommendations. Determine your write-up’s objectives and audience. Keep the write-up as short and simple as possible to achieve the objectives.

IT 111
article thumbnail

How WIRED Lost $100,000 in Bitcoin

WIRED Threat Level

We mined roughly 13 Bitcoins and then ripped up our private key. We were stupid—but not alone.

Mining 112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

109
109
article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. At a high level, attacks against classifiers can be broken down into three types: Adversarial inputs. , which are specially crafted inputs that have been developed with the aim of being reliably misclassified in order to evade detection.

Mining 107
article thumbnail

Tips for Implementing Foundational Controls

Data Breach Today

Tripwire's Tim Erlin on Ways to Prevent Breaches Improperly implemented foundational controls pave the way for many data breaches, says Tim Erlin of Tripwire, who offers tips on building a strong foundation.

article thumbnail

Dominic Cummings is the true cowardly face of the Brexiters | Nick Cohen

The Guardian Data Protection

Vote Leave’s director refuses to go before the Commons. He fears the truth will out Dominic Cummings is just a troll. He may have trolled the whole country and changed the course of British history, but he’s still the man with an egg for a face, who screams everyone must be accountable for their actions – everyone except him. MPs who want to question Cummings about the finances of his Vote Leave campaign are “grandstanding” fools spreading “fake news”.

IT 112
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How to solve four common challenges when outsourcing records to the cloud – Part 2

TAB OnRecord

In last week’s blog post we explored some of the common challenges faced by organizations when storing records in the cloud. We learned that when looking for a cloud storage provider, you need to consider issues of compliance and legal control over records. In part two of our post, we explore two more challenges and [.] Read More. The post How to solve four common challenges when outsourcing records to the cloud – Part 2 appeared first on TAB Records Management Blog | TAB OnRecord.

Cloud 103
article thumbnail

Stealthy, Destructive Malware Infects Half a Million Routers

WIRED Threat Level

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine.

Security 111
article thumbnail

1834: The First Cyberattack

Schneier on Security

Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of Bordeaux, where information about market movements took several days to arrive from Paris by mail coach. Accordingly, traders who could get the information more quickly could make money by anticipating these movements.

Marketing 100
article thumbnail

Get Ready for 'WannaCry 2.0'

Dark Reading

Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.

95
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Report: Facebook App Exposed 3 Million More Users' Data

Data Breach Today

Revenge of the Personality Test, Take Two Researchers at the University of Cambridge, via a myPersonality test on Facebook, reportedly used data from 3 million users to power a spin-off company that delivered targeted advertising services. Facebook says the app is one of 200 that it's suspended for suspicious data handling practices.

IT 185
article thumbnail

UK regulator orders Cambridge Analytica to release data on US voter

The Guardian Data Protection

In landmark cross-border decision, Information Commissioner’s Office gives company 30 days to comply with David Carroll’s request Cambridge Analytica has been ordered to hand over all the data and personal information it has on an American voter, including details of where it got the data and what it did with it, or face a criminal prosecution. The UK Information Commissioner’s Office (ICO) served the enforcement notice to the company on Friday in a landmark legal decision that opens the way for

IT 111
article thumbnail

How a functional classification system can improve your RIM program

TAB OnRecord

A properly functioning classification system is an integral part of your RIM program. Without it, records will become disorganized and potentially lost, undermining the entire purpose of your RIM program. What is functional classification? Functional classification is the “what” of your RIM program. It is the method for identifying records and their content.

article thumbnail

The Untold Story of Robert Mueller's Time in the Vietnam War

WIRED Threat Level

Special Counsel Robert Mueller’s job is to make sense of how Russia hacked the 2016 election. But to make sense of Mueller, you have to revisit some of the bloodiest battles of Vietnam.

Security 112
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Clearing the Complication - Making Machine Learning and Artificial Intelligence Accessible and Useful

AIIM

These days it feels almost impossible to have a conversation with anyone involved in the world of Information Management without bringing up machine learning and artificial intelligence. Everyone is talking about it, everyone has an opinion, everyone claims to be doing it — or at least thinking about doing it. AI is part of the popular zeitgeist, entering our lives in the form of autonomous vehicles on our roads, Alexa in our homes, and a burgeoning AI arms race between rival world powers.

article thumbnail

Over 5K Gas Station Tank Gauges Sit Exposed on the Public Net

Dark Reading

One gas station failed its PCI compliance test due to security holes in its automated gas tank gauge configuration, researcher says.

article thumbnail

Twitter: We Goofed; Change Your Password Now

Data Breach Today

Passwords Inadvertently Saved to Log in Plaintext Format; Twitter Blames Bug Twitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an internal log, potentially putting them at risk. Twitter has blamed a bug for the fault, and recommends all users change their passwords immediately.

Passwords 184
article thumbnail

Cambridge Analytica: how did it turn clicks into votes?

The Guardian Data Protection

Whistleblower Christopher Wylie explains the science behind Cambridge Analytica’s mission to transform surveys and Facebook data into a political messaging weapon • The six weeks that brought Cambridge Analytica down How do 87m records scraped from Facebook become an advertising campaign that could help swing an election? What does gathering that much data actually involve?

IT 111
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

How to solve four common challenges when outsourcing records to the cloud Part 1

TAB OnRecord

In some ways, moving to an outsourced cloud provider is a bit like outsourcing the storage of your physical files – whether to an active records center or to a box storage provider. In both cases, the files themselves now reside within facilities owned and managed by the outsourcing provider. In both cases you are relying on another party to help ensure the privacy and security of your records.

Cloud 99
article thumbnail

How to Keep Hackers Out of Your Facebook and Twitter Accounts

WIRED Threat Level

Scammers, pranksters, and bad actors all want to break into whatever social media accounts they can. Here's how to keep yours safe.

Security 111
article thumbnail

Seeing Through the Haze to Leverage the Power of the Cloud

AIIM

If we were to believe everything we hear in the press, then all computing and data storage is moving to the cloud — and quickly! The reality, though, is more nuanced. Firstly, there is no singular cloud; instead, there are hundreds of clouds to choose from. Secondly, not everything is moving to the cloud, and even the stuff that is, is moving slowly.

Cloud 93