Sat.Mar 25, 2023 - Fri.Mar 31, 2023

article thumbnail

GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

The Last Watchdog

Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the culture building approaches of high-risk industries like construction that devote sustained attention to embedding safety throughout the organization. For most organizations, building a cybersecurity culture is a necessary evil rather than a cherished goal.

article thumbnail

Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare

Dark Reading

Indicators point to Twitter's source code being publicly available for around 3 months, offering a developer security object lesson for businesses.

Security 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biden Administration Announces National Cybersecurity Strategy

Data Matters

On March 1, 2023, the Biden administration announced its long-awaited National Cybersecurity Strategy. The strategy is part of the administration’s efforts to bolster and modernize public and private responses to cybersecurity threats. The post Biden Administration Announces National Cybersecurity Strategy appeared first on Data Matters Privacy Blog.

article thumbnail

Crypto Was Afraid to Show Its Face at SXSW 2023

WIRED Threat Level

Any mention of crypto was deliberately veiled at this year’s festival. And that strategy might catch on.

IT 92
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Tomorrow’s Careers In Artificial Intelligence

Information Governance Perspectives

The following excerpt about Artificial Intelligence is based on the book Tomorrow’s Jobs Today , available at Barnes & Noble , Amazon , and other fine booksellers. Artificial Intelligence, or AI, refers to the use of human intelligence in machines that are programmed to think and act like us humans. It’s often divided into weak and strong categories.

More Trending

article thumbnail

UK Sets Up Fake Booter Sites To Muddy DDoS Market

Krebs on Security

The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake booter sites.

Marketing 277
article thumbnail

Beware the Spirit vs. the Letter of a Policy

Weissman's World

TL;DR It’s bad enough when an information policy doesn’t align with an organization’s objectives. But it’s far worse when it has more to do with protecting a fiefdom than the greater good. Case in point: the New Hampshire Governor’s Office? There’s an interesting dynamic taking place in the New Hampshire governor’s office that to this… Read More » Beware the Spirit vs. the Letter of a Policy The post <strong>Beware the Spirit vs. the Letter of a Policy</strong> appeare

IT 156
article thumbnail

The Uniquely American Future of US Authoritarianism

WIRED Threat Level

The GOP-fueled far right differs from similar movements around the globe, thanks to the country’s politics, electoral system, and changing demographics.

Security 145
article thumbnail

Look Beyond TikTok: Massive Data Collection Is the Real Risk

Data Breach Today

All Social Media Apps Collect Information on a Scale That Facilitates Surveillance There's much national security ado about how much user data gets collected by the Chinese-owned, wildly popular video-sharing app TikTok. But as France's ban of "recreational apps" from government-issued devices highlights, a bigger-picture approach for combating surveillance is required.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

German Police Raid DDoS-Friendly Host ‘FlyHosting’

Krebs on Security

Authorities in Germany this week seized Internet servers that powered FlyHosting , a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure.

IT 271
article thumbnail

The Times They Are A-Changin’

AIIM

Then you better start swimmin' Or you'll sink like a stone For the times they are a - changin'. When Bob Dylan wrote his famous song “The Times They Are a - Changin” in 1963, it was an anthem for the era and the civil rights movement. Dylan’s ageless lyrics still resonate today as we navigate political, economic, societal, and technological changes.

article thumbnail

How Good Smile, a Major Toy Company, Kept 4chan Online

WIRED Threat Level

Documents obtained by WIRED confirm that Good Smile, which licenses toy production for Disney, was an investor in the controversial image board.

Privacy 145
article thumbnail

North Korean Threat Groups Steal Crypto to Pay for Hacking

Data Breach Today

APT43 Launders Crypto Through Mining, Says Mandiant North Korean hackers are stealing cryptocurrency to fund operations under an apparent mandate from Pyongyang to be self-sufficient, threat intel firm Mandiant says. The regime probably expected its hackers to pay their own way before 2020, but the novel coronavirus pandemic exacerbated its demands.

Mining 280
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

MacStealer malware: A growing threat to macOS users

Jamf

MacStealer has been discovered and linked to a threat actor distributing it in the wild. The malicious code extracts a variety of files, browser cookies, and login information from a victim's system. Also, it collects end-user privacy and sensitive data, like credit card information from popular web browsers. Learn more about this new macOS malware variant and how Jamf Protect safeguards your devices, users and data from this emerging threat.

Privacy 128
article thumbnail

The value of Micro Focus to OpenText – analysts weigh in

OpenText Information Management

The size and scope of the OpenText acquisition of Micro Focus makes the deal newsworthy, and industry pundits have generally greeted the news with optimism. The strategic value for OpenText spans a range of market opportunities, as evidenced by the recent assessments of three analysts who cover the tech market. This blog takes a closer … The post The value of Micro Focus to OpenText – analysts weigh in appeared first on OpenText Blogs.

Marketing 123
article thumbnail

The New Face of Fraud: FTC Sheds Light on AI-Enhanced Family Emergency Scams

KnowBe4

The Federal Trade Commission is alerting consumers about a next-level, more sophisticated family emergency scam that uses AI that imitates the voice of a "family member in distress".

article thumbnail

Subprime Lender TitleMax Hit With Hacking Incident

Data Breach Today

Personal, and Potentially Financial Data Exposed in 'Contained' Incident The parent company of subprime lender TitleMax says hackers made off the Social Security numbers and financial account information of up to nearly 5 million individuals. The company notified the FBI and "believes the incident has been contained." Hackers stole information over an 11 day period.

Security 268
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Russian Cyberwarfare Documents Leaked

Schneier on Security

Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company’s work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU;

Military 120
article thumbnail

Aruba ClearPass Policy Manager NAC Solution Review

eSecurity Planet

Originally designed as a network access control (NAC) solution, Aruba ClearPass continues to evolve into a portfolio of network security tools. Even as the capabilities expand, ClearPass continues to deliver on its central purpose of controlling network access at scale. To compare Aruba ClearPass against their competition, see the complete list of top network access control (NAC) solutions.

article thumbnail

Vulkan Playbook Leak Exposes Russia's Plans for Worldwide Cyberwar

Dark Reading

Russian intelligence services, together with a Moscow-based IT company, are planning worldwide hacking operations that will also enable attacks on critical infrastructure facilities.

IT 113
article thumbnail

Essential Steps to Building a Robust API Security Program

Data Breach Today

Gartner's Dionisio Zumerle on API Security Challenges, Risk Assessments and Trends Recent high-profile breaches resulting from API attacks are "just the tip of the iceberg," said Gartner analyst Dionisio Zumerle. "What we have is a new way of exchanging information which is increasingly popular, and almost no organization has the recipe to secure that new way of communicating.

Security 268
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Artificial Intelligence Makes Phishing Text More Plausible

KnowBe4

Cybersecurity experts continue to warn that advanced chatbots like ChatGPT are making it easier for cybercriminals to craft phishing emails with pristine spelling and grammar, the Guardian reports.

article thumbnail

What is HR compliance?

OpenText Information Management

What is HR compliance for employee document management? Very broadly, HR compliance refers to the practice of ensuring your HR policies and procedures adhere to all applicable laws, ethics and regulations and updating them as regulations change and your organization grows. It is a critical component of HR’s role, but perhaps one of the most … The post What is HR compliance?

article thumbnail

Phishing Emails Up a Whopping 569% in 2022

Dark Reading

Credential phishing emails are the clear favorite of threat actors, with a 478% spike last year, new research shows.

Phishing 137
article thumbnail

Will Customer Refunds for Scams Trigger First-Party Fraud?

Data Breach Today

M&T Bank's Karen Boyer on Why First-Party Fraud Is Hard for Banks to Detect The U.S. Consumer Financial Protection Bureau is mulling over whether to reimburse consumers for online scams and fraud, but this regulatory change could lead to an increase in first-party fraud, cautioned Karen Boyer, senior vice president of financial crimes at M&T Bank.

234
234
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Weakness at the Network Edge: Mandiant Examines 2022’s Zero-Day Exploits

eSecurity Planet

Enterprise IT, network and security product vulnerabilities were among those actively exploited in zero-day attacks last year, according to a recent Mandiant report. Mandiant tracked 55 zero-day vulnerabilities that were actively exploited in 2022. That’s fewer than the 81 zero-days exploited in 2021, but far more than those exploited in any previous year.

Cloud 104
article thumbnail

ESI Protocol Checklist For Collaboration Data

Hanzo Learning Center

Why Are ESI Protocols Important for Legal Teams During Ediscovery? Ensure Preservation of Relevant ESI : ESI protocols help to ensure that relevant ESI is properly preserved, collected, and produced. These protocols can specify the types of ESI that must be preserved, how it should be collected and stored, and who is responsible for ensuring its preservation.

IT 102
article thumbnail

Microsoft Patches 'Dangerous' RCE Flaw in Azure Cloud Service

Dark Reading

The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform's nodes.

Cloud 120