Sat.Jun 02, 2018 - Fri.Jun 08, 2018

article thumbnail

New Data Privacy Regulations

Schneier on Security

When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate the pervasive surveillance taking place on the internet. Right now, the only way we can force these companies to take our privacy more seriously is through the market. But the market is broken.

article thumbnail

Cryptocurrency: A Gold Mine for Open-Source Intelligence

Data Breach Today

Expert Says Virtual Currency Systems Leak Useful Data to Track Criminals Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.

Mining 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 EIM software benefits for your enterprise in 2018

OpenText Information Management

Enterprise Information Management (EIM) is rapidly becoming a ‘must have’ for many organizations. It helps deliver the value in enterprise information by making it accessible, meaningful, accurate, timely and secure. In this blog, we look at the key benefits in implementing an effective enterprise-wide EIM strategy can bring to your company. Today, the advance of … The post Top 10 EIM software benefits for your enterprise in 2018 appeared first on OpenText Blogs.

Access 45
article thumbnail

Australia drafts laws forcing Facebook and Google to reveal encrypted data

The Guardian Data Protection

Security agencies would be given access to encrypted messaging apps under bid to ‘modernise’ laws Technology companies such as Facebook and Google would be forced to give Australian security agencies access to encrypted data under legislation to be introduced by the Turnbull government. But the government has refused to say how the security agencies would access the data.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Crime Fighting Gets High-Tech Advances Palantir, Axom, and More

WIRED Threat Level

Beyond big data, officers are increasingly turning to software and ­predictive analytics from companies like Palantir to anticipate when and where misdeeds are likely to occur.

Big data 103

More Trending

article thumbnail

Ten best practices for a successful RIM training program – Part one

TAB OnRecord

As you begin new records and information management programs, you will inevitably encounter the challenge of how to train employees and enlist their cooperation. In this two-part blog post, we share the ten best practices for a successful records and information management training program. Obtain senior management endorsement Your training program will have its [.

article thumbnail

5 Tips for Protecting SOHO Routers Against the VPNFilter Malware

Dark Reading

Most home office users need to simply power cycle their routers and disable remote access; enterprises with work-at-home employees should move NAS behind the firewall.

Access 90
article thumbnail

What Will Microsoft's GitHub Buy Mean For Controversial Code?

WIRED Threat Level

The tech giant will officially acquire the legendary developer platform. The question now is what happens to some of the code it hosts.

IT 101
article thumbnail

GDPR: UK Privacy Regulator Open to Self-Certification

Data Breach Today

Focus on Continuous Compliance and Breach Response, Experts Say One day, organizations may be able to self-certify their GDPR compliance, says an official at the U.K.'s data privacy regulator. Regardless, experts recommend that organizations ensure they are focusing on continuous GDPR compliance and regularly testing their data breach response plans.

GDPR 143
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

GP practice fined £35K for failing to secure medical records

IT Governance

The Information Commissioner’s Office (ICO) has fined London surgery Bayswater Medical Centre (BMC) £35,000 after highly sensitive medical information was left unsecured in an empty building. According to the ICO, the data was left exposed for more than 18 months – this included medical records, prescription information and patient identifiable medicines.

article thumbnail

MyHeritage Alerts Users to Data Breach

Dark Reading

A researcher found email addresses and hashed passwords of nearly 92.3 million users stored on a server outside MyHeritage.

article thumbnail

Britannica Insights Is a Chrome Extension to Fix False Google Results

WIRED Threat Level

Encyclopedia Britannica released a Chrome extension designed to fix Google's sometimes inaccurate "featured snippets.".

Security 107
article thumbnail

Another Fitness App Exposes Users' Data

Data Breach Today

Independent Researcher Finds PumpUp Data Was Accessible on Unsecured Amazon Server For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.

Access 139
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to prepare for a penetration test

IT Governance

Conducting a successful penetration test is a challenge for even the most experienced tester. It involves much more than simply running tools and probing systems. Rather, it requires a lot of skill and experience, as testers need to know what vulnerabilities to look for, where to find them and how to exploit them. However, penetration testing isn’t a dark art.

article thumbnail

Facebook Bug Sets 14M Users' Settings to 'Public'

Dark Reading

The default sharing setting was accidentally changed for millions of accounts during a four-day period last month.

106
106
article thumbnail

WannaCry Hero Marcus Hutchins' New Legal Woes Spell Trouble for White Hat Hackers

WIRED Threat Level

By expanding the case against Marcus Hutchins, the Department of Justice has signaled a troubling interpretation of cybersecurity law.

article thumbnail

Congress Considers Ways to Beef Up Healthcare Cybersecurity

Data Breach Today

At Hearing, and in Letter, Concerns Raised About Confusion Over HHS's Role Congress is considering how to help beef up the healthcare sector's preparedness and response to cyber threats. But why is there so much confusion about the role of the Department of Health and Human Services?

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Germany: First court decision on GDPR

DLA Piper Privacy Matters

Only five days after the GDPR became applicable, the first German court, the Regional Court ( Landgericht ) Bonn (in a decision dated 29 May 2018, case number 10 O 171/18 – in German only), issued a ruling on the practical application of the GDPR. This probably makes the court’s ruling the first GDPR court decision worldwide, and the decision addressed the hot-button issue of public availability of ICANN “WHOIS data”.

GDPR 75
article thumbnail

Researcher Succesfully Hacked In-Flight Airplanes - From the Ground

Dark Reading

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be 'weaponized.

107
107
article thumbnail

IBM Recognized as Hortonworks Partner of the Year

IBM Big Data Hub

There’s a lot to love about open-source technology. Based on the idea that a community of people can iterate on and improve something better than a single person, team, or even company, open-source promises continuous innovation and community support.

73
article thumbnail

Geneology Service MyHeritage Leaked 92 Million Credentials

Data Breach Today

Company Says No Indications Data Family Trees, DNA Results Affected The geneology service MyHeritage says a security researcher found 92 million email addresses and hashed passwords for its users on a private external server. The company, however, says there's no evidence of abnormal account activity or indications family trees or DNA results were affected.

Passwords 125
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Turnbull would 'love to see' Facebook's Zuckerberg face Australian MPs

The Guardian Data Protection

Intelligence committee wants to know what data was shared with Chinese firms and why Malcolm Turnbull would “love to see the boss” of Facebook appear before Australia’s intelligence committee, as parliament grapples with new security threats wrought by global internet and social network giants. After coming to terms on the government’s proposed foreign interference and espionage laws, which are expected to have bipartisan support when the joint committee hands down its report later on Thursday ,

article thumbnail

Sidley Updates Bloomberg Portfolio on FTC Enforcement of Privacy & Data Security

Data Matters

Sidley Austin has recently updated its “FTC Enforcement of Privacy & Data Security,” which has been published as part of Bloomberg Law’s Privacy & Data Security Practice Portfolio, Portfolio No. 500, available here. This updated and enhanced portfolio explains the enforcement authorities, powers, and limitations of the Federal Trade Commission (FTC), and its ever-evolving role as the de facto United States privacy and information security regulator in many sectors.

Privacy 60
article thumbnail

7 GDPR readiness success stories to inspire any company

IBM Big Data Hub

Businesses are likely to look back on the early days of the GDPR and tell stories about how their relationships with customers changed forever. What will your story be?

GDPR 73
article thumbnail

Medical Device Cyber Vulnerabilities: More Alerts

Data Breach Today

Healthcare Organizations Face Challenge of Tracking, Mitigating All the Risks Identified The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.

Risk 117
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Web Application Firewalls Adjust to Secure the Cloud

Dark Reading

Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here's what to keep in mind as you browse the growing market.

Cloud 74
article thumbnail

An Encryption Upgrade Could Upend Online Payments

WIRED Threat Level

While ditching TLS 1.0 encryption will benefit the payments ecosystem, it'll be rough going for those with older devices.

article thumbnail

Why digital business needs a trusted data foundation

IBM Big Data Hub

This is an era in which everything has become digital. We live in the data-driven society. The difficulty is that all this digital technology still doesn’t totally cooperate.

70