Sat.Apr 21, 2018 - Fri.Apr 27, 2018

article thumbnail

Current forecast: Cloudy with a chance of exposed data

Thales Cloud Protection & Licensing

By Peter Galvin, Chief Strategy & Marketing Officer, Thales eSecurity. Today, organizations are rapidly adopting cloud technology. Many organizations have implemented a cloud first philosophy, requiring that any new applications or IT investments start with the cloud. And not just one cloud, but organizations are investing in multiple clouds and SaaS applications.

Cloud 75
article thumbnail

A closer look at the GDPR’s technical requirements

IT Governance

The EU General Data Protection Regulation (GDPR) will soon be in effect, but many organisations are still working towards compliance. One part of the Regulation tripping people up is Article 32: Security of processing. It describes the technical and organisational measures that organisations should have in place, but it’s densely written and uses unfamiliar terms: Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as we

GDPR 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Transformation Threatened by a Rising Tide of Information Chaos

AIIM

This is the third article in a series; the other two are: Surviving Disruption -- Strategies for the Era of AI and Machine Learning. Looking at Information Management Through a Different Lens. Digital Transformation effectiveness is imperiled by a rising tide of information chaos and confusion. AIIM believes that information is the currency that fuels an organization.

article thumbnail

NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach?

IT Governance

Over the next few months, organisations across the EU and the rest of the world will be coming to terms with two new cyber security laws: the EU General Data Protection Regulation (GDPR) and the Directive on security of network and information systems (NIS Directive). Their requirements overlap in many places, which has inevitably led to questions about whether an organisation can be fined twice for the same incident.

GDPR 50
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Atlanta's Ransomware Cleanup Costs Hit $2.6 Million

Data Breach Today

Money Would Have Been Better Spent on Prevention, Experts Say The city of Atlanta's ransomware outbreak cleanup and response tab has hit $2.6 million, after a March attack froze corporate servers, employees' PCs and resident-facing portals. Experts say the breach response funds would have been put to better use preventing the outbreak in the first place.

Cleanup 187

More Trending

article thumbnail

Arron Banks, the insurers and my strange data trail

The Guardian Data Protection

Carole Cadwalladr just wanted to insure her car. Six months later, she found a mass of personal details held by a firm she had never contacted that is run by Leave.EU’s biggest donor, Arron Banks. How did it get there? If a 29-year-old Peugeot 309 is the answer, it’s fair to wonder: what on earth is the question? In fact, I had no idea about either the question or the answer when I submitted a “subject access request” to Eldon Insurance Services in December last year.

Insurance 111
article thumbnail

Record user policies and procedures manual

TAB OnRecord

Many RIM managers are tasked with finding ways to ensure their RIM programs are effectively and accurately used. The best way to accomplish this is to develop a policies and procedures manual for record users. This will ensure your organization reaps all of its RIM program benefits. It should outline what responsibilities, expectations, and authority [.

article thumbnail

Thailand Seizes 'Hidden Cobra' Command-and-Control Servers

Data Breach Today

North Korea Suspected of Running 'GhostSecret' Attacks Against Banks, Others The Thai government has seized servers used to run the so-called GhostSecret cyber espionage campaign that targets organizations in the finance, healthcare and critical infrastructure sectors - and beyond. McAfee suspects the attacks are being launched by "Hidden Cobra" - a hacking group tied to North Korea.

article thumbnail

A One-Minute Attack Let Hackers Spoof Hotel Master Keys

WIRED Threat Level

Researchers found—and helped fix—a flaw in Vingcard RFID locks that would let hackers break into any room in hotels around the world.

Security 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Price comparison site data may have been used by Leave.EU

The Guardian Data Protection

Former Cambridge Analytica director told MPs Brexit campaign group may have used data from Moneysupermarket Personal information gathered from price comparison websites may have been used without people’s knowledge or consent by pro-Brexit campaigners in the European referendum. An ex-director of Cambridge Analytica told parliament last week that she believed the Leave.EU campaign, headed by Nigel Farage and bankrolled by Arron Banks, may have breached data protection laws by using people’s priv

Insurance 111
article thumbnail

Challenges faced while training an AI to combat abuse

Elie

This post looks at the main challenges that arise when training a classifier to combat fraud and abuse. At a high level, what makes training a classifier to detect fraud and abuse unique is that it deals with data generated by an adversary that actively attempts to evade detection. Sucessfully training a classifier is such adversarial settings requires to overcome the following four challenges: Non stationarity.

article thumbnail

FDA Unveils Plan for 'Software as a Medical Device' Review

Data Breach Today

Agency Says It Would Assess Vendors' 'Cybersecurity Responsibility' The FDA is proposing to pre-certify vendors of certain medical device software, including various mobile apps, allowing the companies to skip the agency's much more rigorous pre-market approval process for hardware-based medical devices.

Marketing 172
article thumbnail

Can This System of Unlocking Phones Crack the Crypto War?

WIRED Threat Level

Ray Ozzie thinks his Clear method for unlocking encrypted devices can attain the impossible: It satisfies both law enforcement and privacy purists.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Home Office data exemption sparks fears of further Windrush scandals

The Guardian Data Protection

Rights groups say new data protection legislation will lead to further miscarriages of justice The Home Office is to be given sweeping data protection exemptions that will prevent anyone seeking information about their immigration status in future, campaigners for the Windrush generation are warning. Continue reading.

Privacy 111
article thumbnail

Challenges faced while training an AI to combat abuse

Elie

This post looks at the four main challenges that arise when training a classifier to combat fraud and abuse. This is the second post of a series of four that is dedicated to provide a concise overview of how to harness AI to build robust anti-abuse protections. The first post. explains why AI is key to build robust anti-defenses that keep up with user expectations and increasingly sophisticated attackers.

article thumbnail

Recent Ransomware Incidents Serve Up Lessons

Data Breach Today

Experts Say Breaches Spotlight Business Associate Risks Two recent security incidents involving ransomware attacks on vendors serve as the latest reminders of the risks business associates pose to healthcare organizations. What steps should entities take to mitigate those risks?

article thumbnail

Atlanta Spent $2.6M to Recover From $52,000 Ransomware Scare

WIRED Threat Level

Whether to pay ransomware is a complicated—and costly—calculation.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

WhatsApp raises minimum age to 16 for Europeans ahead of GDPR

The Guardian Data Protection

Facebook-owned messaging service will demand users confirm they are old enough to use app after raising age limit from 13 WhatsApp is raising the minimum user age from 13 to 16, potentially locking out large numbers of teenagers as the messaging app looks to comply with the EU’s new data protection rules. The Facebook-owned messaging service that has more than 1.5 billion users will ask people in the 28 EU states to confirm they are 16 or older as part of a prompt to accept a new terms of servic

GDPR 109
article thumbnail

IRL Analogies Explaining Digital Concepts are Terrible

Troy Hunt

Remember the anti-piracy campaign from years back about "You Wouldn't Steal a Car"? This was the rather sensationalist piece put together by the Motion Picture Association of America in an attempt to draw parallels between digital piracy and what they viewed as IRL ("In Real Life") equivalents. Here's a quick recap: The very premise that the young girl sitting in her bedroom in the opening scene is in any way relatable to the guy in the dark alley sliding a slim jim down the Merc

article thumbnail

Toolkit Generates Malicious Office Macro Malware

Data Breach Today

'Rubella Macro Builder' Available on Cybercrime Underground for $40 Per Month Are you a fraudster craving an easy way to generate Microsoft Office documents with embedded malicious macros designed to serve as droppers that install banking Trojans onto a victim's PC? Say hello to a toolkit that debuted in February called Rubella Macro Builder.

140
140
article thumbnail

Why So Many People Make Their Password 'Dragon'

WIRED Threat Level

The mythical creature's popularity says a lot about the psychology of password creation.

Passwords 111
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Cambridge University rejected Facebook study over 'deceptive' privacy standards

The Guardian Data Protection

Exclusive: panel told researcher Aleksandr Kogan that Facebook’s approach fell ‘far below ethical expectations’ A Cambridge University ethics panel rejected research by the academic at the centre of the Facebook data harvesting scandal over the social network’s “deceptive” approach to its users privacy, newly released documents reveal. A 2015 proposal by Aleksandr Kogan, a member of the university’s psychology department , involved the personal data from 250,000 Facebook users and their 54 milli

Privacy 103
article thumbnail

Thoughts on AI: Is AI coming to your emotional rescue?

IBM Big Data Hub

According to real estate data firm Co-Star, over 90 million square feet of retail space is slated to close this year, leading observers to point to an obvious truth: empathy matters in customer service. .

Retail 81
article thumbnail

UK Teen Sentenced for 'Cyber Terrorizing' US Officials

Data Breach Today

Kane Gamble Receives Two-Year Sentence for Targeting CIA, FBI, DHS Officials British teenager Kane Gamble has been sentenced to serve two years in a youth detection center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.

140
140
article thumbnail

Joy Reid Blames Hackers, Just Like Everyone Else

WIRED Threat Level

Joy Reid may have very well been the target of a malicious breach. Or she's just the latest person to blame hackers for her past mistakes.

Security 104
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

'Facebook is a morality-free zone’: tech chief lambasted by MP

The Guardian Data Protection

Executive apologises over Cambridge Analytica scandal as Tory MP accuses Facebook of bullying Facebook has been accused of being a “morality-free zone” that bullies journalists and threatens academics, as one of its executives appeared in front of MPs. The Conservative MP Julian Knight told the social network’s chief technical officer, Mike Schroepfer, the company’s reaction to the Cambridge Analytica scandal suggested a “pattern of behaviour” that included “bullying journalists, threatening aca

IT 102
article thumbnail

Enhancing Pwned Passwords Privacy by Exclusively Supporting Anonymity

Troy Hunt

When I launched Pwned Passwords in August , I honestly didn't know how much it would be used. I made 320M SHA-1 password hashes downloadable and also stood up an API to query the data "as a service" by either a plain text password or a SHA-1 hash. (Incidentally, for anyone about to lose their mind over SHA-1, read that launch post as to why that hashing algorithm is used.

article thumbnail

Police Seize Webstresser.org, Bust 6 Suspected Admins

Data Breach Today

DDoS Stresser/Booter Service's Servers Seized; Top Users Also Arrested Police have taken down Webstresser, a leading stresser/booter service tied to 4 million on-demand DDoS attacks, which could be used for as little as $15 per month. Six of the site's administrators have been arrested, as have some of the site's top users, authorities say.

133
133