Sat.Feb 03, 2018 - Fri.Feb 09, 2018

article thumbnail

Blockchain for Identity: 6 Hot Projects

Data Breach Today

Distributed Ledgers For Identity and Access Management Have Great Promise Blockchain technology already underpins the boom in cryptocurrencies, but is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.

article thumbnail

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

WIRED Threat Level

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New UK data protection rules are a cynical attack on immigrants | Claude Moraes

The Guardian Data Protection

Non-nationals subject to an immigration procedure are to lose the right to access data held about them, in a discriminatory move that worries the European parliament In September, I warned in a Guardian opinion article that the Brexit process could have the effect of allowing the UK government to bring in more draconian and discriminatory immigration laws, harking back to the 70s and 80s.

article thumbnail

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Cloud Protection & Licensing

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Whether it’s varying protection levels, differing operational techniques and policies, or juggling multiple keys, managing more than one encryption system can quickly turn into a complex web that demands time, expertise and money to manage effectively.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Feds Dismantle Ukrainian's $530 Million Carding Empire

Data Breach Today

'In Fraud We Trust' Was International 'Infraud Organization' Slogan The U.S. Department of Justice, in one of its biggest-ever cybercrime disruptions, shuttered the Infraud Organization, an online forum prosecutors tied to $530 million in losses. Thirteen suspects - in Australia, France, Italy, Kosovo, Serbia, the U.K. and the U.S. - have been arrested.

IT 174

More Trending

article thumbnail

EU data protection law may end up protecting scammers, experts warn

The Guardian Data Protection

WHOIS, one of oldest tools on internet for verifying real identities, at risk of being killed due to tough new GDPR regulations Sweeping new European data protection regulations may have the accidental effect of protecting scammers and spammers by killing the WHOIS system used to link misdeeds online to real identities offline, security experts have warned.

GDPR 91
article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. But they rightly have concerns. As the report notes: The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.

article thumbnail

Flash Hack: Adobe Updates Plug-in After Zero-Day Attacks

Data Breach Today

Malicious Spreadsheets With Embedded Flash Trace to North Korean Attackers A hacking team dubbed "Group 123" with apparent ties to the government of North Korea has been exploiting a zero-day vulnerability in the Flash browser plug-in, likely to hack high-value targets. Adobe has released an emergency Flash update with security fixes. Or organizations could simply stop using Flash.

article thumbnail

Polisis AI Reads Privacy Policies So You Don't Have To

WIRED Threat Level

Polisis, a machine-learning-trained tool, automatically produces readable charts of where your data ends up for any online service.

Privacy 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AI's Future in Cybersecurity

eSecurity Planet

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce.

article thumbnail

Uber: 'No Justification' for Breach Cover-Up

Data Breach Today

CISO Says Characterizing Payoff as Bug Bounty Was Wrong Uber CISO John Flynn tells a U.S. Senate subcommittee that the company should have told the public sooner about its 2016 data breach. He says the company's attempt to position its $100,000 payoff to hackers as a bug bounty was not appropriate.

article thumbnail

Autosploit, Strava Heat Maps, and More Top Security News This Week

WIRED Threat Level

The memo release, Olympics hacking, and more of the week's top security news.

Security 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How State Governments Can Protect and Win with Big Data, AI and Privacy

Bill Schmarzo - Dell EMC

I was recently asked to conduct a 2-hour workshop for the State of California Senior Legislators on the topic of “Big Data, Artificial Intelligence and Privacy.” Honored by the privilege of offering my perspective on these critical topics, I shared with my home-state legislators how significant opportunities await the state. I reviewed the once-in-a-generation opportunities awaiting the great State of California (“the State”), where decision makers could vastly improve their constituents’ qualit

article thumbnail

How Long is Long Enough? Minimum Password Lengths by the World's Top Sites

Troy Hunt

I've been giving a bunch of thought to passwords lately. Here we have this absolute cornerstone of security - a paradigm that every single person with an online account understands - yet we see fundamentally different approaches to how services handle them. Some have strict complexity rules. Some have low max lengths. Some won't let you paste a password.

article thumbnail

Hospital Hit With Cryptocurrency Mining Malware

Data Breach Today

Are More Healthcare Sector Entities at Risk? Do healthcare entities face a growing risk of being hit with cryptocurrency mining attacks, which have become more common in other sectors? A Tennessee hospital may be the first victim in the sector, and some security experts predict many more such incidents.

Mining 150
article thumbnail

Feds Take Down Infraud, a $530M Cybercrime Forum That Lasted 7 Years

WIRED Threat Level

Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.

Marketing 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

8 Nation-State Hacking Groups to Watch in 2018

Dark Reading

The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

82
article thumbnail

How to write a GDPR data protection policy

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) project is producing appropriate documentation to demonstrate your compliance. As part of this, organisations will need to produce a data protection policy. To help you prepare for the fast-approaching compliance deadline (25 May 2018), we have outlined what the data protection policy is, what you should be looking to include and what tools can help your organisation produce this essential piece of documentation.

GDPR 79
article thumbnail

Apple, Cisco Strike Partnerships for Cyber Insurance

Data Breach Today

Policies Offer Incentives for Good Information Security Practices Apple and Cisco say they've partnered with insurers Aon and Allianz to offer cyber insurance policies for organizations that meet best security practices and use products from the technology companies. The partnership follows increasing interest in cyber insurance as a hedge against hacking risks.

Insurance 140
article thumbnail

Scammers Are Stealing Bitcoin on Twitter With a Classic Scheme

WIRED Threat Level

A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it's spreading.

IT 110
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Mastering Security in the Zettabyte Era

Dark Reading

Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.

article thumbnail

LEAP makes perfect fit in OpenText™ cloud services strategy

OpenText Information Management

It’s been one year now since we announced our acquisition of Documentum, InfoArchive, Captiva, and LEAP SaaS Platform and Applications. LEAP had truly found a home as it was the perfect fit into the OpenText™ Cloud Services strategy. Having been in development for almost 2 years, it came fully equipped with an extensive list of … The post LEAP makes perfect fit in OpenText™ cloud services strategy appeared first on OpenText Blogs.

Cloud 78
article thumbnail

Behavioral Analytics' Role in Health Data Security

Data Breach Today

Healthcare entities are increasingly considering user and entity behavioral analytics tools because their previous breach prevention and detection efforts have fallen short, says security expert Mac McMillan.

Analytics 133
article thumbnail

Time's Just About Up to Secure the 2018 Midterm Elections

WIRED Threat Level

The first primary for the 2018 midterm elections takes place March 6—and many states are still woefully underprepared.

Security 106
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The Guardian view on internet privacy: it’s the psychology, stupid | Editorial

The Guardian Data Protection

The ease with which giant databases can be queried and cross-referenced makes privacy vanish on the internet Privacy is necessary for human society to function. The problem is not that the information exists but that it reaches the wrong people. Information on the internet could bring great benefits to society, and to individuals, when huge datasets can be refined to yield information otherwise unavailable.

Privacy 75
article thumbnail

The top trends for manufacturing in 2018

OpenText Information Management

We’re now quite well into 2018 but I thought it was still worth putting together a blog on the trends I see affecting manufacturing over the coming year. I’ve chosen two legislative changes and three technology-driven trends. Taken together, I think they add up to great opportunities for manufacturers but an increasingly challenging business environment … The post The top trends for manufacturing in 2018 appeared first on OpenText Blogs.

article thumbnail

Accused Russian Botnet Mastermind Extradited to US

Data Breach Today

Peter Levashov Allegedly Distributed Spam, Ransomware via Kelihos Botnet Russian citizen Peter Levashov, arrested last year while vacationing in Spain, appeared Friday in U.S. federal court to face charges that he owned and operated the Kelihos botnet and distributed spam, banking Trojans and ransomware for profit. Levashov has pleaded not guilty.