Sat.Feb 10, 2018 - Fri.Feb 16, 2018

article thumbnail

Russia Will Meddle in US Midterm Elections, Spy Chief Warns

Data Breach Today

White House Inaction Questioned by Some Lawmakers The top U.S. intelligence official has warned Congress that Russia will attempt to meddle in the this year's U.S. midterm elections, a repeat of the country's alleged 2016 U.S. presidential election interference.

189
189
article thumbnail

Did Russia Affect the 2016 Election? It’s Now Undeniable

WIRED Threat Level

In the wake of the Mueller indictment of a Russian troll farm, any attempt to claim that the 2016 election wasn’t affected by Russian meddling is laughable.

Security 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook personal data use and privacy settings ruled illegal by German court

The Guardian Data Protection

Firm to appeal decision by Berlin regional court which upholds complaints that users not given informed consent Facebook’s default privacy settings and use of personal data are against German consumer law, according to a judgement handed down by a Berlin regional court. The court found that Facebook collects and uses personal data without providing enough information to its members for them to render meaningful consent.

article thumbnail

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

“Mr. Schmarzo, we’ve noticed that your cholesterol count is at 210, so we have prescribed Fluvastatin and placed selected foods into your shopping basket to help you control your cholesterol. Complete the purchase by selecting ‘ here ’ and we’ll deliver the medication and groceries to your home today between 4:00 and 4:20pm. If you complete the full Fluvastatin prescription, then we’ll reduce your monthly healthcare insurance payment by 5%.”.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Equifax Confirms 'Probable' Breached Data Was Indeed Stolen

Data Breach Today

Breach Victim Tally Remains Unchanged, But Investigators Find More PII Stolen Equifax says that its digital forensic investigators have found that while its tally of 145.5 million U.S. breach victims hasn't changed, more of them had their email addresses, tax identification numbers and driver's license information exfiltrated.

IT 177

More Trending

article thumbnail

Four important questions that AI can help retailers answer

OpenText Information Management

In my previous blog, I looked at how quickly Artificial Intelligence (AI) is rapidly becoming a part of the retail experience. Industry analysts agree that 2018 will be the year that AI brings top and bottom line benefits to innovative companies. So, where can AI most help retailers? Here’s four questions I think a combination … The post Four important questions that AI can help retailers answer appeared first on OpenText Blogs.

Retail 98
article thumbnail

Going Down the Rabbit Hole

AIIM

When I was a young child, in an era when school papers had to be researched in libraries with card catalogs and shelves upon shelves of books, my father had the bright idea to purchase a complete set of Encyclopedia Britannica. Now, we lived on a tight budget and my mother wasn’t too thrilled with this splurge when a perfectly good library was so close to home.

article thumbnail

U.S. Indicts 13 Russians for Election Interference

Data Breach Today

'Information Warfare Against the United States' Alleged A U.S. grand jury has taken the extraordinary step of indicting 13 Russian nationals and three Russian companies for allegedly interfering with the U.S. political system, including the 2016 presidential election, in what the Justice Department portrays as "information warfare against the United States.

174
174
article thumbnail

Mueller Indictment: Russian Trolls Stole Real US Identities to Fool Facebook

WIRED Threat Level

A new Justice Department indictment alleges Russia's disinformation operations created bank and social media accounts using the stolen identities of real US citizens.

Security 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

Another day, another breach. It’s sarcastic, it’s comical, but it’s also real. Barely a day goes by where we don’t hear of a data breach. Affecting big companies and small in virtually every vertical and hitting government institutions at the local, state and federal level, sensitive data is routinely exfiltrated, stolen and leveraged with shocking regularity.

IoT 89
article thumbnail

Content Migration -- Go Manual? Or Find a Partner?

AIIM

Carefully think through the pros and cons of your approach to content migration. The advent of a new generation of modern content solutions and the desire of many organizations to reduce the number of content systems is driving organizations to look at how they can update their content management infrastructure. More and more organizational leaders face the need to migrate legacy content to a newer content suite, either in the cloud or on premise.

ECM 93
article thumbnail

Criminals Hide 'Billions' in Cryptocurrency, Europol Warns

Data Breach Today

Police Want More Help From Cryptocurrency Exchanges During Major Investigations Criminals in Europe are annually laundering at least $4 billion - and growing - via cryptocurrencies, warns Europol. The agency is calling on regulators and legislators to regulate cryptocurrencies to help battle money laundering and protect consumers.

150
150
article thumbnail

Pro-Gun Russian Bots Flood Twitter After Parkland Shooting

WIRED Threat Level

In the wake of Wednesday's Parkland, Florida school shooting Russian bots have taken to Twitter to stoke the gun control debate.

Security 112
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

City & County of Denver: How to redesign a document-intensive business process – Part 2

TAB OnRecord

When Colorado approved the retail sale of marijuana in 2013, the City & County of Denver was hit with a massive influx of applications from hopeful retailers. In a two-part blog post we show how they dealt with the backlog and redesigned their business process in the new era of legalized marijuana sales. In part [.] Read More. The post City & County of Denver: How to redesign a document-intensive business process – Part 2 appeared first on TAB Records Management Blog | TAB OnRecord.

Retail 83
article thumbnail

It's like Deja Vu all over again -- a Records Management classic

AIIM

As Yogi supposedly once said, it's like deja vu all over again. I recently came across this article from e-doc Magazine (remember that?) by my friend Nishan DeSilva (then of Watson Wyatt fame, now at Microsoft). (Speaking of e-doc Magazine, how many remember it's successor, Infonomics magazine. Gosh I wish we had held onto that name.). Many of the core concepts are still relevant and can be applied to the current challenges facing records managers.

article thumbnail

Government Websites Deliver Cryptocurrency Mining Code

Data Breach Today

Security of Code Pushed by Content Delivery Networks Remains Ongoing Concern More than 4,200 websites, some belonging to the U.S., U.K. and Australian governments, have been turning their visitors' computers into mining machines to harvest the virtual currency Monero. The security lapse continues the recent trend of cryptocurrency mining malware overtaking ransomware.

Mining 150
article thumbnail

Facebook's Onavo Protect VPN Offers Less Privacy Protection Than Other Apps

WIRED Threat Level

The "Protect" menu item in Facebook's mobile apps refers users to the company's Onavo Protect VPN, but the tool falls short of basic privacy standards.

Privacy 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

3 Tips to Keep Cybersecurity Front & Center

Dark Reading

In today's environment, a focus on cybersecurity isn't a luxury. It's a necessity, and making sure that focus is achieved starts with the company's culture.

article thumbnail

How We Learned to Love Event Based Retention

AIIM

Allow me to introduce you to Wendy McLain, Manager of Enterprise Content & Records Management at Valero. Valero is a publicly traded international oil and gas company, with revenue in the billions of dollars. Wendy will be presenting at The AIIM Conference 2018. Her session is called "How We Learned to Love Event Based Retention: A Valero Energy Case Study in Records Management.

article thumbnail

Aetna Breach Case Gets Messier

Data Breach Today

New Lawsuits Filed in the Wake of 2017 Mailing Mishap A case involving a 2017 privacy breach that has already cost health insurer Aetna about $20 million in legal settlements is getting messier. What new questions and lessons are emerging?

Insurance 140
article thumbnail

Facebook Notification Spam Has Crossed the Line

WIRED Threat Level

From SMS notifications to an egregious number of emails, the social media company's desperation has gone too far.

Security 111
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How to decrease shopping cart abandonment using AB testing

OpenText Information Management

One of the most common challenges e-tailers face today is high cart abandonment rates. According to a 2017 Baymard study, the average cart abandonment rate is just over 69%. Without a doubt, the high abandonment rate signifies a serious disconnect between visitor expectations and their actual online buying experience. So the question then becomes, what is causing that … The post How to decrease shopping cart abandonment using AB testing appeared first on OpenText Blogs.

article thumbnail

What's in store for a CDO at Think 2018

IBM Big Data Hub

When you wake up, the last thing you want to ask yourself is, “What did my data do last night?” CDOs who find themselves asking that question can put a stop to it on March 19. IBM is bringing experts and leaders across data governance and integration to the annual Think conference.

article thumbnail

Russian Indictments: 'It's About Time'

Data Breach Today

Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election.

IT 133
article thumbnail

'Olympic Destroyer' Malware Hit Pyeongchang Ahead of Opening Ceremony

WIRED Threat Level

Researchers at Cisco Talos detail a new piece of disruptive, highly infectious malware with a clear target: the Pyeongchang Olympics IT infrastructure.

IT 109
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

What is a content management system (CMS)?

OpenText Information Management

The names (and acronyms) may be similar, but there’s a huge difference between the different solution sets that can fall under the banner of Content Management System (CMS). So let’s try to clear up the confusion and explain the role for an enterprise CMS today. CMS as a term has been around for a long … The post What is a content management system (CMS)?

CMS 75
article thumbnail

9 Top Secure Web Gateway Vendors

eSecurity Planet

A look at top vendors in the market for web security gateway solutions, a critical tool for defending against web threats.

article thumbnail

Microsoft Outlines Digital ID Plan Using Blockchain

Data Breach Today

Encrypted ID 'Hubs' Will Safely Store Personal Data After a year of brainstorming on blockchain technology, Microsoft says it will add support in its Authenticator app for a decentralized identity system that's designed to put users in control of their personal information.