Sat.Apr 28, 2018 - Fri.May 04, 2018

article thumbnail

Besieged Cambridge Analytica Shuts Down

Data Breach Today

Data Analysis Firm at Heart of Facebook Scandal Cambridge Analytica, the data analysis firm that reportedly received data on up to 87 million Facebook users without their consent, shut down on Wednesday. The company had worked on the 2016 campaign of U.S. President Donald Trump.

174
174
article thumbnail

The GDPR and the right to be forgotten

IT Governance

Something that’s drawn a lot of attention in the lead up to the General Data Protection Regulation (GDPR) compliance deadline is “the right to erasure”, also known as the “right to be forgotten”. The new data subject right allows, in certain circumstances, individuals to request that all information held about them is permanently erased. Although your organisation will not always have to comply with an erasure request, you must if: The personal data is no longer necessary for the purpose you ori

GDPR 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Records Center is not an Archives: Transfer Forms!

The Schedule

[Note: This was a forum post to the Records Management Section list on SAA’s site that got a little out of hand. Rather than clog everyone’s mailbox, I decided to post it here. The fact that I can add Futurama GIFs to posts here, and not on SAA Connect, had absolutely nothing to do with this decision (he said, unconvincingly.). For your reference, the original question:].

article thumbnail

5 things you need to know about CIR management

IT Governance

What does cyber incident response (CIR) management do? CIR management can help your organisation mitigate the risk of information security incidents and minimise losses. A proper incident response framework will allow you to prevent unauthorised access to data stores, identify attack vectors and breaches, prevent and isolate malware, remediate threats, control your risk and exposure during an incident, and minimise operational losses.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Tips for Implementing Foundational Controls

Data Breach Today

Tripwire's Tim Erlin on Ways to Prevent Breaches Improperly implemented foundational controls pave the way for many data breaches, says Tim Erlin of Tripwire, who offers tips on building a strong foundation.

More Trending

article thumbnail

Victoria threatens to pull out of facial recognition scheme citing fears of Dutton power grab

The Guardian Data Protection

Identity matching bill provides ‘significant scope’ for minister to expand powers, state warns Victoria has threatened to pull out of a state and federal government agreement for the home affairs department to run a facial recognition system because the bill expands Peter Dutton’s powers and allows access to information by the private sector and local governments.

article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

109
109
article thumbnail

Twitter: We Goofed; Change Your Password Now

Data Breach Today

Passwords Inadvertently Saved to Log in Plaintext Format; Twitter Blames Bug Twitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an internal log, potentially putting them at risk. Twitter has blamed a bug for the fault, and recommends all users change their passwords immediately.

Passwords 184
article thumbnail

How to Change Your Twitter Password Right Now

WIRED Threat Level

On World Password Day, Twitter discloses a major gaffe that left user passwords potentially vulnerable.

Passwords 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How a functional classification system can improve your RIM program

TAB OnRecord

A properly functioning classification system is an integral part of your RIM program. Without it, records will become disorganized and potentially lost, undermining the entire purpose of your RIM program. What is functional classification? Functional classification is the “what” of your RIM program. It is the method for identifying records and their content.

article thumbnail

MPs threaten Mark Zuckerberg with summons over Facebook data

The Guardian Data Protection

Parliament may formally call CEO to face Cambridge Analytica questions next time he is in UK MPs have threatened to issue Mark Zuckerberg with a formal summons to appear in front of parliament when he next enters the UK, unless he voluntarily agrees to answer questions about the activities of his social network and the Cambridge Analytica scandal. Damian Collins, the chair of the parliamentary committee that is investigating online disinformation, said he was unhappy with the information the com

101
101
article thumbnail

Hackers Target 3 Mexican Banks' Real-Time Transfers

Data Breach Today

Mexico's Central Bank Says No Client Money Lost, But Activates Contingency Plans Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.

IT 174
article thumbnail

Nigerian Email Scammers Are More Effective Than Ever

WIRED Threat Level

By fine-tuning social engineering techniques and targeting small businesses, Nigerian scammers have kept well ahead of defenses.

Security 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How to handle mistakes while using AI to block attacks

Elie

This post looks at the main difficulties faced while using a classifier to block attacks: handling mistakes and uncertainty such that the overall system remains secure and usable. At a high level, the main difficulty faced when using a classifier to block attacks is how to handle mistakes. The need to handle errors correctly can be broken down into two challenges: how to strike the right balance between false positives and false negatives, to ensure that your product remains safe when your class

article thumbnail

Cambridge Analytica closure – questions and answers

The Guardian Data Protection

Following the Facebook data crisis, the company has folded. But will the scandal now end? Which companies are closing down? Cambridge Analytica, the company at the heart of the data scandal which has engulfed Facebook, announced it was shutting down on Wednesday evening. Continue reading.

IT 89
article thumbnail

Australian Bank Lost Data For 19.8 Million Accounts

Data Breach Today

Commonwealth Bank Says Risks From Loss Of Two Magnetic Tapes Are Low Commonwealth Bank has confirmed that two magnetic tapes containing transaction information for 19.8 million accounts went missing two years ago after mishandling by a subcontractor. A forensic investigation concluded the tapes were likely destroyed, and no fraudulent activity has been detected.

Risk 172
article thumbnail

Cambridge Analytica Shuts Down Amid Ongoing Facebook Crisis

WIRED Threat Level

The troubled data firm, which improperly accessed the data of up to 87 million Facebook users, has ceased operations.

Access 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to handle mistakes while using AI to block attacks

Elie

This post looks at the main difficulty faced while using a classifier to block attacks: handling mistakes and uncertainty such that the overall system remains secure and usable. This is the third post in a series of four that is dedicated to providing a concise overview of how to use artificial intelligence (AI) to build robust anti-abuse protections.

article thumbnail

Commonwealth Bank admits it lost backup data for 20m accounts

The Guardian Data Protection

The bank, one of the Australia’s big four, assures customers the information has not been compromised Sign up to receive the top stories from Guardian Australia every morning The Commonwealth Bank is reportedly facing renewed investigations after admitting it lost backup data on tape for more than 15 years of customer statements in 2016, affecting almost 20 million accounts.

IT 87
article thumbnail

Cybercrime Se Habla Español: Inside the Underground

Data Breach Today

Flashpoint's Liv Rowley Traces Spanish Language Hacker Forums in Latin America Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.

160
160
article thumbnail

AI Can Help Cybersecurity—If It Can Fight Through the Hype

WIRED Threat Level

There are a ton of claims around AI and cybersecurity that don't quite add up. Here's what's really going on.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

NIST Issues Call for "Lightweight Cryptography" Algorithms

Schneier on Security

This is interesting: Creating these defenses is the goal of NIST's lightweight cryptography initiative, which aims to develop cryptographic algorithm standards that can work within the confines of a simple electronic device. Many of the sensors, actuators and other micromachines that will function as eyes, ears and hands in IoT networks will work on scant electrical power and use circuitry far more limited than the chips found in even the simplest cell phone.

IoT 85
article thumbnail

EU: data-harvesting tech firms are 'sweatshops of connected world'

The Guardian Data Protection

Data protection supervisor lambasts companies’ deluge of ‘take it or leave it’ privacy emails ahead of GDPR The European data protection supervisor has hit out at social media and tech firms over the recent constant stream of privacy policy emails in the run up to GDPR, calling them them the “sweatshops of the connected world”. With the tough new General Data Protection Regulations coming into force on 25 May, companies around the world are being forced to notify their users to accept new privac

GDPR 86
article thumbnail

NSA: The Silence of the Zero Days

Data Breach Today

US Defense Department Defenders Say Attackers Don't Need No Stinking Zero Days The head of the NSA's Cybersecurity Threat Operations Center says attackers haven't bothered targeting unclassified U.S. Defense Department networks with a zero-day exploit in 24 months. Instead, they attempt to exploit flaws within 24 hours of information of the vulnerability or exploit going public.

article thumbnail

DDoS For Hire, a CIA Card Game, and More Security News This Week

WIRED Threat Level

A major DDoS for hire site gets taken down, the CIA has a card game that you can play soon too, and more security news this week.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

GDPR compliance: Reasons to be cheerful

IBM Big Data Hub

When you hire a life coach, feelings can often be mixed. Someone is helping you on the way to improving yourself, but that path is one you have to walk, and it can be tough. Feelings can be much the same about the European Union’s General Data Protection Regulation (GDPR), which some organizations view as a burden. But can’t it make your business fitter and healthier?

GDPR 84
article thumbnail

Is Automation Obtainable? It is in your Accounts Payable Department

AIIM

AP Automation is an obtainable goal in this century, in this decade, in this year! How, you may ask? If you can relate to this stat from recent AIIM research where 52% of respondents say their invoice processes take at least three days – some up to as many as 25 days – when using manual solutions for invoice data entry, validation, and approval using paper, you are a prime candidate.

IT 83
article thumbnail

Twitter Sold Data to Cambridge University Psychologist

Data Breach Today

Same Researcher, Aleksandr Kogan, Sold Facebook Data to Cambridge Analytica Twitter is now caught up in the Cambridge Analytica scandal: The social network sold public Twitter data to Aleksandr Kogan, the same person who sold Facebook data to Cambridge Analytica. Twitter says Kogan obtained no private information on users.

157
157