Sat.Apr 28, 2018 - Fri.May 04, 2018

article thumbnail

Besieged Cambridge Analytica Shuts Down

Data Breach Today

Data Analysis Firm at Heart of Facebook Scandal Cambridge Analytica, the data analysis firm that reportedly received data on up to 87 million Facebook users without their consent, shut down on Wednesday. The company had worked on the 2016 campaign of U.S. President Donald Trump.

174
174
article thumbnail

The GDPR and the right to be forgotten

IT Governance

Something that’s drawn a lot of attention in the lead up to the General Data Protection Regulation (GDPR) compliance deadline is “the right to erasure”, also known as the “right to be forgotten”. The new data subject right allows, in certain circumstances, individuals to request that all information held about them is permanently erased. Although your organisation will not always have to comply with an erasure request, you must if: The personal data is no longer necessary for the purpose you ori

GDPR 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Records Center is not an Archives: Transfer Forms!

The Schedule

[Note: This was a forum post to the Records Management Section list on SAA’s site that got a little out of hand. Rather than clog everyone’s mailbox, I decided to post it here. The fact that I can add Futurama GIFs to posts here, and not on SAA Connect, had absolutely nothing to do with this decision (he said, unconvincingly.). For your reference, the original question:].

article thumbnail

5 things you need to know about CIR management

IT Governance

What does cyber incident response (CIR) management do? CIR management can help your organisation mitigate the risk of information security incidents and minimise losses. A proper incident response framework will allow you to prevent unauthorised access to data stores, identify attack vectors and breaches, prevent and isolate malware, remediate threats, control your risk and exposure during an incident, and minimise operational losses.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

New Rowhammer Attack Hijacks Android Smartphones Remotely

WIRED Threat Level

Dutch researchers have pushed the mind-bending Rowhammer hacking technique one more step towards a practical attack.

Security 260

More Trending

article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

Your company's website does not have to be the next victim of a SQL injection breach. Here's how to prevent SQL injection attacks.

111
111
article thumbnail

Victoria threatens to pull out of facial recognition scheme citing fears of Dutton power grab

The Guardian Data Protection

Identity matching bill provides ‘significant scope’ for minister to expand powers, state warns Victoria has threatened to pull out of a state and federal government agreement for the home affairs department to run a facial recognition system because the bill expands Peter Dutton’s powers and allows access to information by the private sector and local governments.

article thumbnail

How to Change Your Twitter Password Right Now

WIRED Threat Level

On World Password Day, Twitter discloses a major gaffe that left user passwords potentially vulnerable.

Passwords 255
article thumbnail

Twitter: We Goofed; Change Your Password Now

Data Breach Today

Passwords Inadvertently Saved to Log in Plaintext Format; Twitter Blames Bug Twitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an internal log, potentially putting them at risk. Twitter has blamed a bug for the fault, and recommends all users change their passwords immediately.

Passwords 184
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Is Automation Obtainable? It is in your Accounts Payable Department

AIIM

AP Automation is an obtainable goal in this century, in this decade, in this year! How, you may ask? If you can relate to this stat from recent AIIM research where 52% of respondents say their invoice processes take at least three days – some up to as many as 25 days – when using manual solutions for invoice data entry, validation, and approval using paper, you are a prime candidate.

IT 106
article thumbnail

MPs threaten Mark Zuckerberg with summons over Facebook data

The Guardian Data Protection

Parliament may formally call CEO to face Cambridge Analytica questions next time he is in UK MPs have threatened to issue Mark Zuckerberg with a formal summons to appear in front of parliament when he next enters the UK, unless he voluntarily agrees to answer questions about the activities of his social network and the Cambridge Analytica scandal. Damian Collins, the chair of the parliamentary committee that is investigating online disinformation, said he was unhappy with the information the com

109
109
article thumbnail

Cambridge Analytica Shuts Down Amid Ongoing Facebook Crisis

WIRED Threat Level

The troubled data firm, which improperly accessed the data of up to 87 million Facebook users, has ceased operations.

Access 242
article thumbnail

Hackers Target 3 Mexican Banks' Real-Time Transfers

Data Breach Today

Mexico's Central Bank Says No Client Money Lost, But Activates Contingency Plans Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.

IT 174
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How a functional classification system can improve your RIM program

TAB OnRecord

A properly functioning classification system is an integral part of your RIM program. Without it, records will become disorganized and potentially lost, undermining the entire purpose of your RIM program. What is functional classification? Functional classification is the “what” of your RIM program. It is the method for identifying records and their content.

article thumbnail

Cambridge Analytica closure – questions and answers

The Guardian Data Protection

Following the Facebook data crisis, the company has folded. But will the scandal now end? Which companies are closing down? Cambridge Analytica, the company at the heart of the data scandal which has engulfed Facebook, announced it was shutting down on Wednesday evening. Continue reading.

IT 100
article thumbnail

Nigerian Email Scammers Are More Effective Than Ever

WIRED Threat Level

By fine-tuning social engineering techniques and targeting small businesses, Nigerian scammers have kept well ahead of defenses.

Security 228
article thumbnail

Australian Bank Lost Data For 19.8 Million Accounts

Data Breach Today

Commonwealth Bank Says Risks From Loss Of Two Magnetic Tapes Are Low Commonwealth Bank has confirmed that two magnetic tapes containing transaction information for 19.8 million accounts went missing two years ago after mishandling by a subcontractor. A forensic investigation concluded the tapes were likely destroyed, and no fraudulent activity has been detected.

Risk 172
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

NIST Issues Call for "Lightweight Cryptography" Algorithms

Schneier on Security

This is interesting: Creating these defenses is the goal of NIST's lightweight cryptography initiative, which aims to develop cryptographic algorithm standards that can work within the confines of a simple electronic device. Many of the sensors, actuators and other micromachines that will function as eyes, ears and hands in IoT networks will work on scant electrical power and use circuitry far more limited than the chips found in even the simplest cell phone.

IoT 94
article thumbnail

Commonwealth Bank admits it lost backup data for 20m accounts

The Guardian Data Protection

The bank, one of the Australia’s big four, assures customers the information has not been compromised Sign up to receive the top stories from Guardian Australia every morning The Commonwealth Bank is reportedly facing renewed investigations after admitting it lost backup data on tape for more than 15 years of customer statements in 2016, affecting almost 20 million accounts.

Retail 97
article thumbnail

AI Can Help Cybersecurity—If It Can Fight Through the Hype

WIRED Threat Level

There are a ton of claims around AI and cybersecurity that don't quite add up. Here's what's really going on.

article thumbnail

Cybercrime Se Habla Español: Inside the Underground

Data Breach Today

Flashpoint's Liv Rowley Traces Spanish Language Hacker Forums in Latin America Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.

160
160
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

How to handle mistakes while using AI to block attacks

Elie

This post looks at the main difficulties faced while using a classifier to block attacks: handling mistakes and uncertainty such that the overall system remains secure and usable. At a high level, the main difficulty faced when using a classifier to block attacks is how to handle mistakes. The need to handle errors correctly can be broken down into two challenges: how to strike the right balance between false positives and false negatives, to ensure that your product remains safe when your class

article thumbnail

EU: data-harvesting tech firms are 'sweatshops of connected world'

The Guardian Data Protection

Data protection supervisor lambasts companies’ deluge of ‘take it or leave it’ privacy emails ahead of GDPR The European data protection supervisor has hit out at social media and tech firms over the recent constant stream of privacy policy emails in the run up to GDPR, calling them them the “sweatshops of the connected world”. With the tough new General Data Protection Regulations coming into force on 25 May, companies around the world are being forced to notify their users to accept new privac

GDPR 96
article thumbnail

DDoS For Hire, a CIA Card Game, and More Security News This Week

WIRED Threat Level

A major DDoS for hire site gets taken down, the CIA has a card game that you can play soon too, and more security news this week.

Security 165
article thumbnail

NSA: The Silence of the Zero Days

Data Breach Today

US Defense Department Defenders Say Attackers Don't Need No Stinking Zero Days The head of the NSA's Cybersecurity Threat Operations Center says attackers haven't bothered targeting unclassified U.S. Defense Department networks with a zero-day exploit in 24 months. Instead, they attempt to exploit flaws within 24 hours of information of the vulnerability or exploit going public.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to handle mistakes while using AI to block attacks

Elie

This post looks at the main difficulty faced while using a classifier to block attacks: handling mistakes and uncertainty such that the overall system remains secure and usable. This is the third post in a series of four that is dedicated to providing a concise overview of how to use artificial intelligence (AI) to build robust anti-abuse protections.

article thumbnail

NHS staff aren’t border guards. We won’t police the ‘hostile environment’ | Tim Dudderidge

The Guardian Data Protection

NHS Digital is sharing confidential patient data with the Home Office. This betrays those we are committed to caring for NHS Digital, which collects confidential patient information, is sharing this personal data with the Home Office to support its immigration enforcement work. This can result in patients being detained and potentially deported. In the Doctors of the World (DOTW) UK London clinic , doctors, nurses and support workers provide medical care for people excluded from NHS services – i

article thumbnail

GDPR compliance: Reasons to be cheerful

IBM Big Data Hub

When you hire a life coach, feelings can often be mixed. Someone is helping you on the way to improving yourself, but that path is one you have to walk, and it can be tough. Feelings can be much the same about the European Union’s General Data Protection Regulation (GDPR), which some organizations view as a burden. But can’t it make your business fitter and healthier?

GDPR 84