Sat.Dec 09, 2017 - Fri.Dec 15, 2017

article thumbnail

Cryptocurrency Infrastructure Flaws Pose Bitcoin Risks

Data Breach Today

Major Cybercrime Gangs Shift From Hacking Banks to Bitcoins Bitcoin's massive rise in value and hype continues to draw the attention of hackers, scammers and organized crime. Flaws in bitcoin mining firmware and hacks of wallet software show that the infrastructure associated with cryptocurrency is not always well-secured.

Risk 165
article thumbnail

5 Questions to Ask About Your Social Media Records as Legal Evidence 

AIIM

It's an embarrassing question to ask most organizations, but does your social media presence reflect the reality that the responsibility of business documentation doesn’t go away just because the information is on social media? The reality for most organizations is NO. Recent research conducted by Iron Mountain revealed that 76 percent of businesses regard communications by social media as formal business records, but 46 percent have no idea that they carry legal responsibility for their content

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukip to face tribunal over use of data in EU referendum campaign

The Guardian Data Protection

Information commissioner announces inquiry into parties’ use of personal information after Ukip’s refusal to cooperate Ukip is to face a tribunal over its use of analytics during the EU referendum after refusing to cooperate with an investigation by the Information Commissioner’s Office (ICO). The ICO announced a formal investigation into how political parties use data analytics to target voters in response to concern about how social media was used during the referendum.

Analytics 111
article thumbnail

I'm Sorry You Feel This Way NatWest, but HTTPS on Your Landing Page Is Important

Troy Hunt

Occasionally, I feel like I'm just handing an organisation more shovels - "here, keep digging, I'm sure this'll work out just fine." The latest such event was with NatWest (a bank in the UK), and it culminated with this tweet from them: I'm sorry you feel this way. I can certainly pass on your concerns and feed this back to the tech team for you Troy?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Report: Russian Hackers Target Banks in US, Britain, Russia

Data Breach Today

Nearly $10 Million Stolen from 20 Institutions in Past 1½ Years A group of Russian-speaking hackers over the past year-and-a-half has stolen nearly $10 million from banks, mostly in the United States, Britain and Russia, the Moscow-based, according to cybersecurity firm Group-IB.

More Trending

article thumbnail

The Wired Guide to Digital Security, From Passwords to Faraday Cages

WIRED Threat Level

In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor.

Passwords 110
article thumbnail

The future of API banking dominates SIBOS

OpenText Information Management

Something that barely raised any interest only two years ago was the focus of many of the discussions at this year’s SIBOS. The use of APIs in banking has rapidly gone from a peripheral issue to central to the thinking for many banks. As banks are beginning to gear up for API-related business, the question … The post The future of API banking dominates SIBOS appeared first on OpenText Blogs.

article thumbnail

Significant Changes Coming to NIST Cybersecurity Framework

Data Breach Today

The latest ISMG Security Report focuses on the significant changes found in the latest version of the U.S. government's Framework for Improving Critical Infrastructure Cybersecurity, commonly known as the NIST cybersecurity framework. NIST seeks comments from stakeholders on the draft of version 1.1 of the framework by Jan. 19.

article thumbnail

Is “embodied cognition” the future of AI?

IBM Big Data Hub

As happens so often, IBM is quietly laying the groundwork for the future. A recent step toward that future is TJBot, an unassuming, do-it-yourself cardboard robot that opens a window into what AI researchers are calling “embodied cognition.

IT 81
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Mirai Botnet Was Part of a College Student Minecraft Scheme

WIRED Threat Level

The DDoS attack that crippled the internet last fall wasn't the work of a nation-state. It was three college kids working a *Minecraft* hustle.

IT 112
article thumbnail

The rise of cyber crime

IT Governance

There’s no denying that cyber crime is getting worse every year, but how much has it actually risen over the past few years? Date. Number of records breached. 2010. 3.8 million. 2011. 174 million. 2012. 44 million. 2013. 822 million. 2014. 700 million. 2015. 736 million. 2016. 3.1 billion. With an increase of more than 3 billion records breached over six years, cyber crime is rapidly increasing and it doesn’t seem like organisations’ security functions are keeping up.

article thumbnail

How Malware Known as Triton Threatens Public Safety

Data Breach Today

The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's cybersecurity unit a meaningful name progresses through Congress.

article thumbnail

Security Planner

Schneier on Security

Security Planner is a custom security advice tool from Citizen Lab. Answer a few questions, and it gives you a few simple things you can do to improve your security. It's not meant to be comprehensive, but instead to give people things they can actually do to immediately improve their security. I don't see it replacing any of the good security guides out there, but instead augmenting them.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

MobileCoin: A New Cryptocurrency From Signal Creator Moxie Marlinspike

WIRED Threat Level

MobileCoin aims to make cryptocurrency transactions quick and easy for everyone, while still preserving privacy and decentralization.

Privacy 111
article thumbnail

Protecting data for compliance and transformation

Thales Cloud Protection & Licensing

Until recently, it was nothing more than a buzzword bandied around across various industries. Now though, businesses everywhere are undergoing various forms of digital transformation as they look for ways to better interact with their end customers, whether consumer or corporate. Organisations are finding themselves under increasing pressure from their boards, all keen on moving their businesses forward technologically, to deliver the solutions and services they need to remain competitive in an

article thumbnail

Offshoring PHI: Addressing the Security Issues

Data Breach Today

Experts Offer Insights on Precautions to Take U.S. healthcare entities need to keep security top of mind if they use offshore services to handle protected health information, security experts say, pointing to specific steps to take.

Security 121
article thumbnail

A focus on practical usability in ApplicationXtender 16.3

OpenText Information Management

Welcome to the official first complete release of OpenText™ ApplicationXtender. One of the questions that customers and partners sometimes ask is “Why 16.3?” The answer is simple. The current release for all OpenText products is Release 16 and ApplicationXtender is no exception – processes, technologies and management are aligned with this approach.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

What To Do If You've Been Doxed

WIRED Threat Level

If a troll is spilling your personal info across the internet, you have ways to fight back. Eva Galperin, director of cybersecurity at the EFF, shares tips.

article thumbnail

Remote Hack of a Boeing 757

Schneier on Security

Last month, the DHS announced that it was able to remotely hack a Boeing 757: "We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing a remote, non-cooperative, penetration," said Robert Hickey, aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate. "[Which] means I didn't have anybody touching the airplane, I didn't have an insider threat.

article thumbnail

Critical Components of an Insider Threat Mitigation Program

Data Breach Today

Organizations should take an "inside-out" approach to mitigating the insider threat, says Brandon Swafford of Forcepoint, who explains the components of that approach in an in-depth interview.

117
117
article thumbnail

Understanding the role of Information Rights Management

Information Management Resources

IRM focuses on restricting access and improving security for documents, spreadsheets, PDFs and other important files intended to preserve or share information.

Access 69
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US

WIRED Threat Level

The Islamic State is designing and mass-producing its own advanced munitions—with parts from all over the world.

IT 111
article thumbnail

Court supports eDiscovery machine learning, addresses AI transparency

OpenText Information Management

No other court in the world has had more influence on the use of machine learning in litigation than the U.S. District Court for the Southern District of New York (the “SDNY”) and that tradition continues with the court’s new ruling in Winfield v. City of New York. There’s a lot to unpack in this 28-page … The post Court supports eDiscovery machine learning, addresses AI transparency appeared first on OpenText Blogs.

article thumbnail

DHS Cybersecurity Agency Could Get a New Name and a Revamp

Data Breach Today

National Protection and Programs Directorate Title Fails to Describe Its Purpose What does the title National Protection and Programs Directorate mean to you? It's not so clear, unless you are familiar with the Department of Homeland Security's organizational chart. To clarify its mission, the House has voted to rename - and revamp - the DHS agency.

article thumbnail

Article 29 Working Party Releases GDPR Guidance on Consent and Transparency

Data Matters

On 28 November 2017, the Article 29 Working Party (the “ WP29 ”) published detailed draft guidelines on consent under the EU General Data Protection Regulation (the “ GDPR ”), which is to come into effect on 25 May 2018. The draft guidance has been submitted for public consultation for a six week period before being adopted. The WP29 guidance on consent (“ Consent Guidelines ”) provides an analysis of the notion of consent under the GDPR as well as practical guidance for organisations on the req

GDPR 60
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Bots and Form Letters Make It Nearly Impossible to Find Real FCC Net Neutrality Comments

WIRED Threat Level

Over seven months, 39 Nicholas Thompsons submitted net neutrality comments to the FCC. We tried to track each of them down.

IT 105
article thumbnail

Who is Responsible for IoT Security?

Outpost24

This piece is part 4 of our ongoing series on IoT security. Don't forget to download the ebook to understand the IoT security gap and how your business needs to address it, today.

IoT 67
article thumbnail

Do You Have a Dark Endpoint Problem?

Data Breach Today

Endpoint Continues To Be a Thorn in People's Sides Most of the criminal activity targeting today's enterprises originates at the endpoint, and the majority of modern breaches use known threats or vulnerabilities for which a patch already exists. For this reason, endpoint visibility must be complete and continuous.

113
113