Sat.Jan 13, 2018 - Fri.Jan 19, 2018

article thumbnail

The Coming Battle For Your Web Browser

Data Breach Today

Why the Next Botnet May Be Built From an Army of Web Browsers The browser is the window to the web. But what's going in the background during that browsing is opaque to most users. A new experiment shows how the computing power of tens of thousands of computers could be unknowingly harnessed to crack passwords, harvest cryptocurrencies or conduct DDoS attacks.

Passwords 188
article thumbnail

Management by Magazine (InfoGov Edition)

Weissman's World

Today, on Perpective Check: The truth and consequences of your boss flipping through the pages of a magazine and saying, “I just read about [new shiny infogov object] that EVERYBODY’S using. How come we’re not??” [link]. The post Management by Magazine (InfoGov Edition) appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it.

IT 112
article thumbnail

What are vital records, and how do you protect them?

TAB OnRecord

When vital records are not protected, there is a major risk involved if the unthinkable happens. We’ve created this resource to help your organization mitigate that risk by following these five steps. Read More. The post What are vital records, and how do you protect them? appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Blockchain for Identity Management: It's Years Away

Data Breach Today

Why It Doesn't Fix Long-Running Access Management Problems Technologists are wrangling with an identity puzzle: Is it possible to create a single digital identity that can be seamlessly and securely used at a bank, a hospital or consumer websites? It's the holy grail of identity. But experts say blockchain is likely not the answer right now.

More Trending

article thumbnail

The Astrophysicist Who Wants to Help Solve Baltimore's Urban Blight

WIRED Threat Level

Vacant buildings are more than just an economic threat. They're also a public safety concern. And it turns out they have their own sort of gravitational pull.

IT 111
article thumbnail

Four Malicious Google Chrome Extensions Affect 500K Users

Dark Reading

ICEBRG Security Research team's finding highlights an often-overlooked threat.

article thumbnail

'Hacking Incident' Impacts Nearly 280,000 Medicaid Patients

Data Breach Today

Oklahoma State University Center for Health Sciences Sends Notification Letters A health data breach reported to federal regulators as a "hacking/IT incident" impacting nearly 280,000 Medicaid patients in Oklahoma has experts wondering exactly what happened.

article thumbnail

Does Encryption Really Protect My Cloud Data?

Thales Cloud Protection & Licensing

There has always been a battle between business efficiency and security since the invention of shared compute and data resources. Enterprise risk managers continue to swing the pendulum between business risk and security risk, depending on new demands versus new threats. Today’s enterprises have experienced this pendulum shift as cloud has become more relevant.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How the False Hawaii Missile Warning Could Have Happened

WIRED Threat Level

And where was the federal government?

article thumbnail

Guest Post - Three Critical Steps for GDPR Compliance

AIIM

This is the eighth post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 83
article thumbnail

Intel Confirms Fresh Spectre, Meltdown Patch Problems

Data Breach Today

Latest CPUs Also Suffer From Frequent Rebooting Problem Intel says firmware updates it developed to help protect users against the Meltdown and Spectre vulnerabilities have been causing not just older chipsets but also its newest CPUs - in both client devices and data center servers - to reboot much more frequently than they should.

IT 160
article thumbnail

What is Enterprise Content Management (ECM)?

OpenText Information Management

Enterprise Content Management (ECM) comes in many forms. At its heart, it’s a set of processes, strategies and tools that allow an enterprise to capture, manage, store, preserve, deliver and measure content throughout the enterprise and beyond. In today’s world, information sharing and collaboration with customers, suppliers and other trading partners is essential part of … The post What is Enterprise Content Management (ECM)?

ECM 82
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Triton Malware Details Show the Dangers of Industrial System Sabotage

WIRED Threat Level

New details about Triton malware should put industrial systems and critical infrastructure on notice.

Security 110
article thumbnail

Guest Post -- 10 Mindset Tips for Project Managers

AIIM

Project management often involves working in high stress environments with tight deadlines and multiple competing priorities. The most successful Project Managers learn how to navigate these environments and often have a strong understanding of their own shortcomings and the strengths of their team. To create this success orientated mindset there are a number of tips and strategies that Project Managers can look to adopt. 1 -- Spend Time To Understand Your Own Management Style.

article thumbnail

$17.2 Million Settlement for Breach Case Involving HIV Info

Data Breach Today

Aetna's Settlement Points to Need to Pay Attention to Details A mailing error can have huge consequences. Case in point: Aetna has agreed to a $17.2 million settlement of a class action lawsuit filed after a data breach involving HIV drug information that was visible through envelope windows on thousands of letters.

article thumbnail

4 easy ways to get started with information governance

IBM Big Data Hub

Two paradoxes of information technology are: data has no value if you can’t access it, and it’s a liability if the wrong people access it. Company leaders don’t think they need data governance until these paradoxes hit them hard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even.

Security 108
article thumbnail

What is Customer Experience Management (CEM)?

OpenText Information Management

There was a time when content almost entirely flowed one way – from enterprises to customers. Customers’ responses were effectively measured in sales and occasional surveys. But in today’s digital world, customers demand a two-way omnichannel customer experience. They expect a customer experience that delights or they will go looking at your competitors.

article thumbnail

Bitcoin-Amassing AlphaBay Drug Barons Get US Prison Time

Data Breach Today

'Caliconnect' Earned $1.4 Million on Silk Road Before Its Demise Two men have been sentenced to serve at about six years each in U.S. federal prison after selling drugs such as marijuana and cocaine via darknet markets, including AlphaBay. The separate arrests of both defendants predate law enforcement seizing control of AlphaBay.

Marketing 153
article thumbnail

Where to Find Security Holes in Serverless Architecture

Dark Reading

Serverless architectures take away business responsibility for server management, but security should still be top of mind.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The 'Doublespeak' of Responsible Encryption

WIRED Threat Level

It's a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications—for our own good.

article thumbnail

Home Office pays out £15,500 to asylum seeker over data breach

The Guardian Data Protection

Sensitive information given by government staff to officials in man’s Middle East home country The Home Office has paid out £15,500 in compensation after admitting handing over sensitive information about an asylum seeker to the government of his Middle East home country, a move which could have endangered his life and that of his family. The settlement relates to confidential proof of his persecution in his home country which was wrongly shared with the authorities there.

article thumbnail

Is Healthcare Ready to Comply With GDPR?

Data Breach Today

This edition of the ISMG Security Report takes a look at how ready healthcare organizations are for GDPR compliance. Also featured: comments from Alberto Yepez of Trident Capital on the 2018 outlook for information security companies and a summary of the latest financial fraud trends.

GDPR 147
article thumbnail

Start on the Path to M-12-18 Compliance

Gimmal

The past few years have seen many changes in the ways federal agencies are directed to maintain records, with a particular emphasis on digital records.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Meltdown, Spectre, Malicious Apps, and More of This Week's Security News

WIRED Threat Level

Meltdown, Spectre, malicious Android apps, and more of the week's top security news.

Security 107
article thumbnail

What is the Best Way to Manage Records and Documents?

Record Nations

Most people use the terms “Records” and “Documents” interchangeably. However, there are some important, yet different, aspects of each. Where records aren’t used regularly, they are used to provide evidence of events. Documents are active files that need to be available for people to access and edit. Now what? You have records that you are […].

Access 75
article thumbnail

BlackBerry in Motion: Firm Aims to Secure Cars From Hackers

Data Breach Today

With Jarvis, BlackBerry Targets Connected - and Driverless - Vehicle Security BlackBerry mobile devices have become a rare sight. But drivers of Audi, GM and Mercedes vehicles may be using the company's embedded operating system in their cars, and with a new tool called Jarvis, BlackBerry is also making a play to secure the code used to drive autonomous vehicles.

Security 133