Why CISOs Need a Security Reality Check
Dark Reading
JUNE 13, 2018
We deserve a seat at the executive table, and we'll be much better at our jobs once we take it.
Dark Reading
JUNE 13, 2018
We deserve a seat at the executive table, and we'll be much better at our jobs once we take it.
Data Breach Today
JUNE 12, 2018
Exchanges Remain Prime Target; Easily Available Hacking Tools Aid Attackers As bitcoin continues its massive price fluctuations, a new report says criminals have continued their push to get extortion and ransom payments in more stable cryptocurrencies. But bitcoins remain a top target for hackers, who most often choose to directly target cryptocurrency exchanges.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Thales Cloud Protection & Licensing
JUNE 14, 2018
Did you know that every zebra has its own unique stripe pattern? Just like a human fingerprint, every zebra can be identified by their distinctive set of stripes. Luckily, zebras don’t use mobile devices, or manufacturers would be hard at work on stripe recognition technology. But they’d also be working to supplement their stripe recognition and biometrics with behavioral analytics.
The Last Watchdog
JUNE 13, 2018
The most profound threat to corporate networks isn’t the latest, greatest malware. It’s carbon-based life forms. Humans tend to be gullible and impatient. With our affiliations and preferences put in play by search engines and social media, we’re perfect patsies for social engineering. And because we are slaves to convenience, we have a propensity for taking shortcuts when it comes to designing, configuring and using digital systems.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Krebs on Security
JUNE 13, 2018
In the days following revelations last September that big-three consumer credit bureau Equifax had been hacked and relieved of personal data on nearly 150 million people , many Americans no doubt felt resigned and powerless to control their information. But not Jessamyn West. The 49-year-old librarian from a tiny town in Vermont took Equifax to court.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Data Breach Today
JUNE 15, 2018
In Response, Software Firm Pauses Work With Europol and 'No More Ransom' Portal The anti-Kaspersky Lab rhetoric continues to heat up, with the European Parliament passing a motion that brands the Moscow-based firm's software as being "confirmed as malicious." In response, Kaspersky Lab has halted all work with European institutions, including Europol, pending clarification.
The Last Watchdog
JUNE 14, 2018
Threat actors in the hunt for vulnerable targets often look first to ubiquitous platforms. It makes perfect sense for them to do so. Related article: Triaging open-source exposures. Finding a coding or design flaw on Windows OS can point the way to unauthorized to access to a treasure trove of company networks that use Windows. The same holds true for probing widely used open source protocols, as occurred when Heartbleed and Shellshock came to light.
The Guardian Data Protection
JUNE 11, 2018
Case filed in a Mississippi court alleges data mined in UK was illegally sent abroad by two of Banks’s companies A British public interest group has filed a lawsuit in a Mississippi court against two companies controlled by Arron Banks, the pro-Brexit donor, following allegations that the firms may have violated UK data protection rules in an attempt to sway the 2016 vote to leave the EU.
WIRED Threat Level
JUNE 14, 2018
Russia expects as many as 2 million visitors during the 2018 World Cup, most of whom should take extra precautions against the country's many cyber risks.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Data Breach Today
JUNE 13, 2018
First, Attackers Distracted Bank, Using Buhtrap Malware to Cause Mayhem Banco de Chile has become the latest victim of a SWIFT-related malware incident. Attackers first corrupted thousands of PCs' master boot records as a distraction. Then they used fraudulent SWIFT messages to steal $10 million.
The Last Watchdog
JUNE 14, 2018
The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. A multinational conglomerate, government contractor, or public university must comply with ten or more, which makes demonstrating regulatory compliance seem like a daunting, even impossible, undertaking.
The Guardian Data Protection
JUNE 12, 2018
Consumer electronics retailer apologises and says there is currently no evidence of fraud Dixons Carphone has revealed a major breach of data involving unauthorised access to 5.9 million customers cards and 1.2 million personal records. The consumer electronics retailer said it had detected an attempt to compromise the cards in a processing system at Currys PC World and Dixons Travel, but said there was no evidence of any fraud as a result of the incident.
WIRED Threat Level
JUNE 10, 2018
Microsoft's Windows red team probes and prods the world's biggest operating system through the eyes of an adversary.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Data Breach Today
JUNE 15, 2018
Wallace Sann of ForeScout on Keeping Up With the Growth of Network-Connected Devices The explosion in the growth and diversity of devices linked to networks as a result of the internet of things and BYOD makes it more challenging to manage network security, says Wallace Sann of ForeScout.
eSecurity Planet
JUNE 12, 2018
Gartner analyst lists 10 security projects CISOs should consider this year - and 10 they should have already done.
The Guardian Data Protection
JUNE 12, 2018
ICO says firm ‘failed to prevent’ 2014 Russia-sponsored hack after 500m accounts compromised Yahoo has been fined £250,000 over a hack from 2014 that affected more than 515,000 UK email accounts co-branded with Sky, the Information Commissioner’s Office has announced. The personal data of 500m user accounts worldwide was compromised during a state-sponsored cyber attack in 2014, which was only revealed in 2016.
WIRED Threat Level
JUNE 14, 2018
Jeff Flake and Chris Coons sent Jeff Bezos a letter Thursday with nearly 30 questions about how the company handles user data and privacy.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
Data Breach Today
JUNE 15, 2018
Robert Hamilton of Imperva on the Role of Artificial Intelligence Security alert fatigue is a growing concern, leading to difficulties sorting out false positives from alerts worth investigating, says Robert Hamilton of Imperva.
TAB OnRecord
JUNE 13, 2018
In last week’s blog post we started to explore ten best practices for records management training programs. In part two we will continue by discussing five more best practices for RIM program training success. 6. Don’t forget the value proposition Almost everyone sitting in on your RIM training session will likely be asking themselves “why [.] Read More.
Schneier on Security
JUNE 14, 2018
For many years, I have said that complexity is the worst enemy of security. At CyCon earlier this month, Thomas Dullien gave an excellent talk on the subject with far more detail than I've ever provided. Video. Slides.
Data Matters
JUNE 14, 2018
On 11 June 2018, members of a Committee within the European parliament (“ MEPs ”) narrowly voted in favour of suspending the EU-U.S. Privacy Shield (“ Privacy Shield ”), an agreement that facilitates the transfer of personal data of EU data subjects to the U.S., unless the U.S. government fully complies with the Privacy Shield data protection requirements by 1 September 2018.
Advertisement
Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.
Data Breach Today
JUNE 15, 2018
Carl Leonard of Forcepoint on Dealing With the Insider Threat One year after the Wannacry attack, cybersecurity is still failing, and the likelihood of a breach has never been greater, says Carl Leonard of Forcepoint.
Dark Reading
JUNE 14, 2018
This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations.
JKevinParker
JUNE 9, 2018
The Information Governance Conference , or InfoGovCon, is a fantastic event for information professionals run by my friends at the Information Coalition. This year's event, held September 25-28 in Providence, will mark InfoGovCon's 5th year. I spoke the last 2 years, and I won the 2016 Information Governance Expert of the Year award. At #InfoGov18, I am excited to be a keynote speaker, kicking off the very first Leadership Development Summit.
WIRED Threat Level
JUNE 12, 2018
The arrest of dozens of alleged Nigerian email scammers and their associates is a small, but important, first step toward tackling an enormous problem.
Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL
Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.
Data Breach Today
JUNE 13, 2018
Misaddressed Email Affected Nearly 56,000 Individuals A breach involving misdirected emails to nearly 56,000 patients allegedly tied to a sorting error by a business associate has taken an unusual twist: The organization involved, Dignity Health, is asking for patients' help in mitigating the privacy mishap. But could that move prove to be counterproductive?
IT Governance
JUNE 14, 2018
Little more than three years since its previous security incident, electronics retailer Dixons Carphone has admitted to a data breach compromising 5.9 million customer cards and 1.2 million personal records – making it the biggest online data breach in UK history. In a statement released on Wednesday, the retail giant revealed it had identified the colossal breach while it was reviewing its systems and data.
CGI
JUNE 11, 2018
Seven tips for executives considering robotic process automation. premanath.puch…. Mon, 06/11/2018 - 04:25. Faced with the challenges of becoming digital organizations that truly meet customer and citizen demands, as Craig Wallace recently blogged, many executives are looking to combine new and emerging technologies to support their holistic transformation.
Let's personalize your content