Sat.Feb 03, 2018 - Fri.Feb 09, 2018

article thumbnail

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Cloud Protection & Licensing

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Whether it’s varying protection levels, differing operational techniques and policies, or juggling multiple keys, managing more than one encryption system can quickly turn into a complex web that demands time, expertise and money to manage effectively.

article thumbnail

Blockchain for Identity: 6 Hot Projects

Data Breach Today

Distributed Ledgers For Identity and Access Management Have Great Promise Blockchain technology already underpins the boom in cryptocurrencies, but is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cabinet of Secret Documents from Australia

Schneier on Security

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is sold off cheaply. The deals can be even cheaper when the items in question are two heavy filing cabinets to which no-one can find the keys. They were purchased for small change and sat unopened for some months until the locks were attacked with a drill.

article thumbnail

Bob Mueller’s Investigation Is Larger—and Further Along—Than You Think

WIRED Threat Level

We speak about the “Mueller probe” as a single entity, but it’s important to understand that there are no fewer than five separate investigations under the broad umbrella of the special counsel’s office.

Security 112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New UK data protection rules are a cynical attack on immigrants | Claude Moraes

The Guardian Data Protection

Non-nationals subject to an immigration procedure are to lose the right to access data held about them, in a discriminatory move that worries the European parliament In September, I warned in a Guardian opinion article that the Brexit process could have the effect of allowing the UK government to bring in more draconian and discriminatory immigration laws, harking back to the 70s and 80s.

More Trending

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. But they rightly have concerns. As the report notes: The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.

article thumbnail

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

WIRED Threat Level

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

Security 109
article thumbnail

EU data protection law may end up protecting scammers, experts warn

The Guardian Data Protection

WHOIS, one of oldest tools on internet for verifying real identities, at risk of being killed due to tough new GDPR regulations Sweeping new European data protection regulations may have the accidental effect of protecting scammers and spammers by killing the WHOIS system used to link misdeeds online to real identities offline, security experts have warned.

GDPR 89
article thumbnail

Flash Hack: Adobe Updates Plug-in After Zero-Day Attacks

Data Breach Today

Malicious Spreadsheets With Embedded Flash Trace to North Korean Attackers A hacking team dubbed "Group 123" with apparent ties to the government of North Korea has been exploiting a zero-day vulnerability in the Flash browser plug-in, likely to hack high-value targets. Adobe has released an emergency Flash update with security fixes. Or organizations could simply stop using Flash.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce.

article thumbnail

How State Governments Can Protect and Win with Big Data, AI and Privacy

Bill Schmarzo - Dell EMC

I was recently asked to conduct a 2-hour workshop for the State of California Senior Legislators on the topic of “Big Data, Artificial Intelligence and Privacy.” Honored by the privilege of offering my perspective on these critical topics, I shared with my home-state legislators how significant opportunities await the state. I reviewed the once-in-a-generation opportunities awaiting the great State of California (“the State”), where decision makers could vastly improve their constituents’ qualit

article thumbnail

Polisis AI Reads Privacy Policies So You Don't Have To

WIRED Threat Level

Polisis, a machine-learning-trained tool, automatically produces readable charts of where your data ends up for any online service.

Privacy 101
article thumbnail

Uber: 'No Justification' for Breach Cover-Up

Data Breach Today

CISO Says Characterizing Payoff as Bug Bounty Was Wrong Uber CISO John Flynn tells a U.S. Senate subcommittee that the company should have told the public sooner about its 2016 data breach. He says the company's attempt to position its $100,000 payoff to hackers as a bug bounty was not appropriate.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

City & County of Denver: How to redesign a document-intensive business process – Part 1

TAB OnRecord

When Colorado approved the retail sale of marijuana in 2013, the City & County of Denver was hit with a massive influx of applications from hopeful retailers. The licensing department was soon swamped with a backlog of unprocessed applications. In a two-part blog post we show how they dealt with the backlog and redesigned their [.] Read More. The post City & County of Denver: How to redesign a document-intensive business process – Part 1 appeared first on TAB Records Management Blog | T

Retail 74
article thumbnail

Ensuring that email data is compliant with GDPR regulations

Information Management Resources

Architecting a security, privacy and governance solution can be fast and simple. This checklist will ensure your archiving solutions are in top notch shape before the General Data Protection Regulation is here.

GDPR 74
article thumbnail

Mastering Security in the Zettabyte Era

Dark Reading

Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.

article thumbnail

Hospital Hit With Cryptocurrency Mining Malware

Data Breach Today

Are More Healthcare Sector Entities at Risk? Do healthcare entities face a growing risk of being hit with cryptocurrency mining attacks, which have become more common in other sectors? A Tennessee hospital may be the first victim in the sector, and some security experts predict many more such incidents.

Mining 115
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

AI's Future in Cybersecurity

eSecurity Planet

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.

article thumbnail

How to write a GDPR data protection policy

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) project is producing appropriate documentation to demonstrate your compliance. As part of this, organisations will need to produce a data protection policy. To help you prepare for the fast-approaching compliance deadline (25 May 2018), we have outlined what the data protection policy is, what you should be looking to include and what tools can help your organisation produce this essential piece of documentation.

GDPR 76
article thumbnail

How Long is Long Enough? Minimum Password Lengths by the World's Top Sites

Troy Hunt

I've been giving a bunch of thought to passwords lately. Here we have this absolute cornerstone of security - a paradigm that every single person with an online account understands - yet we see fundamentally different approaches to how services handle them. Some have strict complexity rules. Some have low max lengths. Some won't let you paste a password.

article thumbnail

Google Set to Name and Shame Sites Lacking HTTPS

Data Breach Today

Chrome Browser Will Flag Sites Lacking Security Communication Protocol Google is prepping its Chrome browser to brand as "not secure" every site a user tries to visit that does not use HTTPS encryption by default. The move is meant to push more sites to use HTTPS to secure communications and help block eavesdropping and man-in-the-middle attacks.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

LEAP makes perfect fit in OpenText™ cloud services strategy

OpenText Information Management

It’s been one year now since we announced our acquisition of Documentum, InfoArchive, Captiva, and LEAP SaaS Platform and Applications. LEAP had truly found a home as it was the perfect fit into the OpenText™ Cloud Services strategy. Having been in development for almost 2 years, it came fully equipped with an extensive list of … The post LEAP makes perfect fit in OpenText™ cloud services strategy appeared first on OpenText Blogs.

Cloud 78
article thumbnail

Scammers Are Stealing Bitcoin on Twitter With a Classic Scheme

WIRED Threat Level

A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it's spreading.

IT 96
article thumbnail

I Want to Legal Hold Your Hand

The Schedule

This guest post is by Holly Dolan, MLS, Assistant Manager of Denton County Records Management in Denton, Texas. If you would link to download copies of these valentines for your own re-use, Holly has graciously made this PDF available. At some point in their career every records manager has felt the air go sour when they’ve walked into a room. What is it about records management that sets people on edge?

article thumbnail

Data Breach Reporting Mandate Included in New Singapore Law

Data Breach Today

Owners of CII Must Report Incidents or Face Penalties Singapore's new cybersecurity law passed earlier this week mandates that owners of critical information and infrastructure report cybersecurity incidents to the Cybersecurity Agency. Security experts discuss organizations' readiness to comply.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The top trends for manufacturing in 2018

OpenText Information Management

We’re now quite well into 2018 but I thought it was still worth putting together a blog on the trends I see affecting manufacturing over the coming year. I’ve chosen two legislative changes and three technology-driven trends. Taken together, I think they add up to great opportunities for manufacturers but an increasingly challenging business environment … The post The top trends for manufacturing in 2018 appeared first on OpenText Blogs.

article thumbnail

Feds Take Down Infraud, a $530M Cybercrime Forum That Lasted 7 Years

WIRED Threat Level

Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.

article thumbnail

The Guardian view on internet privacy: it’s the psychology, stupid | Editorial

The Guardian Data Protection

The ease with which giant databases can be queried and cross-referenced makes privacy vanish on the internet Privacy is necessary for human society to function. The problem is not that the information exists but that it reaches the wrong people. Information on the internet could bring great benefits to society, and to individuals, when huge datasets can be refined to yield information otherwise unavailable.

Privacy 73