Why CISOs Need a Security Reality Check
Dark Reading
JUNE 13, 2018
We deserve a seat at the executive table, and we'll be much better at our jobs once we take it.
Dark Reading
JUNE 13, 2018
We deserve a seat at the executive table, and we'll be much better at our jobs once we take it.
Data Breach Today
JUNE 12, 2018
Exchanges Remain Prime Target; Easily Available Hacking Tools Aid Attackers As bitcoin continues its massive price fluctuations, a new report says criminals have continued their push to get extortion and ransom payments in more stable cryptocurrencies. But bitcoins remain a top target for hackers, who most often choose to directly target cryptocurrency exchanges.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Thales Cloud Protection & Licensing
JUNE 14, 2018
Did you know that every zebra has its own unique stripe pattern? Just like a human fingerprint, every zebra can be identified by their distinctive set of stripes. Luckily, zebras don’t use mobile devices, or manufacturers would be hard at work on stripe recognition technology. But they’d also be working to supplement their stripe recognition and biometrics with behavioral analytics.
Krebs on Security
JUNE 13, 2018
In the days following revelations last September that big-three consumer credit bureau Equifax had been hacked and relieved of personal data on nearly 150 million people , many Americans no doubt felt resigned and powerless to control their information. But not Jessamyn West. The 49-year-old librarian from a tiny town in Vermont took Equifax to court.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The Last Watchdog
JUNE 13, 2018
The most profound threat to corporate networks isn’t the latest, greatest malware. It’s carbon-based life forms. Humans tend to be gullible and impatient. With our affiliations and preferences put in play by search engines and social media, we’re perfect patsies for social engineering. And because we are slaves to convenience, we have a propensity for taking shortcuts when it comes to designing, configuring and using digital systems.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Weissman's World
JUNE 12, 2018
A few weeks ago, I used this space to wonder how top-of-mind content migration is among organizations whose legacy solutions are more than 8 years old – which, it turns out, accounts for more than 75% of those in service. There was nothing scientific about this query, but the core responses received were illuminating nonetheless, […]. The post Legacy Content Migration: The Crowd Has it Wrong appeared first on Holly Group.
WIRED Threat Level
JUNE 10, 2018
Microsoft's Windows red team probes and prods the world's biggest operating system through the eyes of an adversary.
The Last Watchdog
JUNE 14, 2018
Threat actors in the hunt for vulnerable targets often look first to ubiquitous platforms. It makes perfect sense for them to do so. Related article: Triaging open-source exposures. Finding a coding or design flaw on Windows OS can point the way to unauthorized to access to a treasure trove of company networks that use Windows. The same holds true for probing widely used open source protocols, as occurred when Heartbleed and Shellshock came to light.
Data Breach Today
JUNE 13, 2018
First, Attackers Distracted Bank, Using Buhtrap Malware to Cause Mayhem Banco de Chile has become the latest victim of a SWIFT-related malware incident. Attackers first corrupted thousands of PCs' master boot records as a distraction. Then they used fraudulent SWIFT messages to steal $10 million.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The Guardian Data Protection
JUNE 11, 2018
Case filed in a Mississippi court alleges data mined in UK was illegally sent abroad by two of Banks’s companies A British public interest group has filed a lawsuit in a Mississippi court against two companies controlled by Arron Banks, the pro-Brexit donor, following allegations that the firms may have violated UK data protection rules in an attempt to sway the 2016 vote to leave the EU.
WIRED Threat Level
JUNE 14, 2018
Russia expects as many as 2 million visitors during the 2018 World Cup, most of whom should take extra precautions against the country's many cyber risks.
The Last Watchdog
JUNE 14, 2018
The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. A multinational conglomerate, government contractor, or public university must comply with ten or more, which makes demonstrating regulatory compliance seem like a daunting, even impossible, undertaking.
Data Breach Today
JUNE 13, 2018
1.2 Million Nonfinancial Records Also at Risk, Electronics Giant Warns The U.K.'s Dixons Carphone is investigating a data breach that resulted in the suspected exposure of 5.9 million payment cards and nonfinancial information for 1.2 million customers. The incident could become the first U.K. breach to fall under the EU's General Data Protection Regulation.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
The Guardian Data Protection
JUNE 12, 2018
Consumer electronics retailer apologises and says there is currently no evidence of fraud Dixons Carphone has revealed a major breach of data involving unauthorised access to 5.9 million customers cards and 1.2 million personal records. The consumer electronics retailer said it had detected an attempt to compromise the cards in a processing system at Currys PC World and Dixons Travel, but said there was no evidence of any fraud as a result of the incident.
WIRED Threat Level
JUNE 15, 2018
Roger Clark allegedly served as Ross Ulbricht's Silk Road consigliere. Friday, the feds announced his extradition from Thailand.
eSecurity Planet
JUNE 12, 2018
Gartner analyst lists 10 security projects CISOs should consider this year - and 10 they should have already done.
Data Breach Today
JUNE 11, 2018
'Operation Wire Wire' a Six-Month, Worldwide Law Enforcement Operation A six-month coordinated global law enforcement effort to crack down on business email compromise schemes has resulted in 74 arrests, the U.S. Department of Justice announced Monday.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
The Guardian Data Protection
JUNE 12, 2018
ICO says firm ‘failed to prevent’ 2014 Russia-sponsored hack after 500m accounts compromised Yahoo has been fined £250,000 over a hack from 2014 that affected more than 515,000 UK email accounts co-branded with Sky, the Information Commissioner’s Office has announced. The personal data of 500m user accounts worldwide was compromised during a state-sponsored cyber attack in 2014, which was only revealed in 2016.
WIRED Threat Level
JUNE 14, 2018
As recent events have shown, using an encrypted messaging app like WhatsApp or Signal is no privacy panacea.
Schneier on Security
JUNE 14, 2018
For many years, I have said that complexity is the worst enemy of security. At CyCon earlier this month, Thomas Dullien gave an excellent talk on the subject with far more detail than I've ever provided. Video. Slides.
Data Breach Today
JUNE 14, 2018
Stakeholders Spotlight a Long List of Problems in Feedback to House Committee A House committee that asked the healthcare sector for feedback on how to improve the cybersecurity of legacy medical devices has received some very strong opinions on the subject. Find out what commenters had to say.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
Dark Reading
JUNE 14, 2018
This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations.
WIRED Threat Level
JUNE 14, 2018
Jeff Flake and Chris Coons sent Jeff Bezos a letter Thursday with nearly 30 questions about how the company handles user data and privacy.
JKevinParker
JUNE 9, 2018
The Information Governance Conference , or InfoGovCon, is a fantastic event for information professionals run by my friends at the Information Coalition. This year's event, held September 25-28 in Providence, will mark InfoGovCon's 5th year. I spoke the last 2 years, and I won the 2016 Information Governance Expert of the Year award. At #InfoGov18, I am excited to be a keynote speaker, kicking off the very first Leadership Development Summit.
Data Breach Today
JUNE 11, 2018
$50 Million Believed Stolen as Exchange Attacks Continue South Korean cryptocurrency exchange Coinrail says hackers stole 30 percent of all of the cryptocurrency tokens it was storing, but many have been successfully frozen or recalled. Security experts say cryptocurrency exchanges remain poorly secured, so they're popular targets for hackers.
Advertisement
Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.
Dark Reading
JUNE 15, 2018
Very few organizations have fully incorporated all relevant risks and threats into their current digital strategy, research finds.
WIRED Threat Level
JUNE 9, 2018
Opinion: The NATO Secretary General explains how the alliance manages the dark side of the web.
IT Governance
JUNE 14, 2018
Little more than three years since its previous security incident, electronics retailer Dixons Carphone has admitted to a data breach compromising 5.9 million customer cards and 1.2 million personal records – making it the biggest online data breach in UK history. In a statement released on Wednesday, the retail giant revealed it had identified the colossal breach while it was reviewing its systems and data.
Let's personalize your content