Sat.Feb 17, 2018 - Fri.Feb 23, 2018

article thumbnail

SEC Releases Updated Cybersecurity Guidance

Data Breach Today

Regulator Demands More Risk Disclosure, Better Insider Trading Policies The U.S. Securities and Exchange Commission has released revised guidance "to assist public companies in preparing disclosures about cybersecurity risks and incidents." It includes new prohibitions on trading in corporate shares after a breach has been discovered but before investors have been notified.

article thumbnail

Perspective Check: InfoGov Short Cuts

Weissman's World

Sorry, kids, but there just aren’t any more short-cuts to good information governance than there are in serious mountaineering. The best I can tell you is to leverage the same sort of disciplined project management skills in infogov as you would in any other initiative you engage in. The post Perspective Check: InfoGov Short Cuts appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Preservation -- High Stakes for Finance and Insurance Companies

AIIM

It is time to think about Digital Preservation differently — as a dedicated capability that keeps long-term information alive and usable and trusted and easily found. The time to act is now. AIIM believes that digital preservation needs to be viewed through the prism of a set of Intelligent Information Management capabilities that are integral to delivering upon the Digital Transformation challenge of understanding, anticipating, and redefining internal and external customer experiences.

article thumbnail

I've Just Launched "Pwned Passwords" V2 With Half a Billion Passwords for Download

Troy Hunt

Last August, I launched a little feature within Have I Been Pwned (HIBP) I called Pwned Passwords. This was a list of 320 million passwords from a range of different data breaches which organisations could use to better protect their own systems. How? NIST explains : When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised.

Passwords 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Locking Down PowerShell to Foil Attackers: 3 Essentials

Data Breach Today

Microsoft Taps Machine Learning to Better Combat Fileless Malware Microsoft has been working to reduce the ability of attackers who use the PowerShell scripting language to "live off the land" in enterprise networks, in part via machine learning. But IT administrators should also have these three essential malicious PowerShell script defenses in place.

IT 157

More Trending

article thumbnail

Information Security and Compliance Through the Prism of Healthcare and Retail

AIIM

Organizations must focus strategically on how to manage digital content and understand that: 1) end-users are consuming technology differently; 2) consumer devices are being increasingly used as “on-ramps” to digital workflows; and 3) how you secure the scan and capture process becomes increasingly important. Let’s explore how these concepts relate to two specific industries – healthcare and retail. 1 -- Healthcare at the practice level illustrates the challenges of matching small business IT re

Retail 94
article thumbnail

Losing sleep over governance? Get your users on board

OpenText Information Management

Many of you are losing sleep over the state of your content. You know its not adequately managed and governed. You know users hoard it unsecured on their desktops, in cloud repositories, in file shares. They circumvent the established protocols and established systems you’ve put in place. With GDPR looming and a parade of corporate … The post Losing sleep over governance?

article thumbnail

Anatomy of a Russian Information Warfare Campaign

Data Breach Today

Cost of Troll Farm: $15 Million. Impact: Priceless Want to meddle with a democracy? Just use its social media outlets against it to amplify already existing social divisions. That's the quick take on the indictment recently unsealed by Special Counsel Robert Mueller that accuses Russians of running an "active measures" campaign against the United States.

IT 175
article thumbnail

US Border Patrol Hasn’t Validated E-Passport Data For Years

WIRED Threat Level

For over a decade, US Customs and Border Patrol has been unable to verify the cryptographic signatures on e-Passports, because they never installed the right software.

Security 108
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

And the survey said. Make your voice heard on the future of Information Management

AIIM

There’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes. Our State of the Industry survey this year is focused on better understanding these information management challenges.

ECM 93
article thumbnail

AI/ML and Digital Security

Thales Cloud Protection & Licensing

Sixty-four percent of the more than 1,200 senior security executives from around the world, whom we surveyed for the 2018 Thales Data Threat Report (DTR), believe artificial intelligence (AI) “increases data security by recognizing and alerting on attacks,” while 43% believe AI “results in increased threats due to use as a hacking tool.”. They’re both right.

article thumbnail

Is US Computer Crime Justice Draconian?

Data Breach Today

Prosecutors Cry 'Deterrence' to Justify Lengthy Sentences. Who's Deterred? Is U.S. computer crime justice draconian? That's one obvious question following England's Court of Appeal ruling that suspected hacker Lauri Love would not be extradited to the United States, in part, because they said the U.S. justice system could not be trusted to treat Love humanely.

139
139
article thumbnail

WhatsApp Co-Founder Brian Acton Injects $50 Million in Newly Formed Signal Foundation

WIRED Threat Level

WhatsApp co-founder Brian Acton has taken on the leadership of the non-profit behind that popular encryption app—and given it a serious injection of cash.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The 3% Edge: How Data Drives Success in Business and the Olympics

Bill Schmarzo - Dell EMC

A recent Bloomberg BusinessWeek article entitled “ The Tech Guy Building Wearables for America’s Olympians ” profiles Mounir Zok, the man in charge of the U.S. Olympic Committee’s technology and innovation. The article discusses how Mr. Zok is bringing a Silicon Valley data scientist mentality to help America’s Olympic athletes more effectively leverage data and analytics to win Olympic medals.

article thumbnail

The Tories claim the data protection bill will make us safer. That’s not true | Diane Abbott

The Guardian Data Protection

The government’s growing store of personal details allows automatic adjudication on crucial aspects of our lives Is your data safe? The answer must be no if this government manages to push through its data protection bill without important amendments. The Tory claim that the bill is necessary for protecting our data is false. Related: The DWP – a bureaucracy of outstanding brutality | Diane Taylor Related: The data protection bill is yet another legal threat to UK press freedom Continue reading.

article thumbnail

Intel Faces 32 Spectre/Meltdown Lawsuits

Data Breach Today

Plaintiffs Seek Damages Over Security Vulnerabilities, Alleged Insider Trading Intel faces 32 lawsuits filed over the trio of flaws in its CPUs known as Meltdown and Spectre, seeking damages for the security vulnerabilities as well as alleged insider trading. The flaws have also been cited in lawsuits against chipmakers AMD and ARM, as well as against Apple.

Security 136
article thumbnail

Inside the Mueller Indictment: A Russian Novel of Intrigue

WIRED Threat Level

The cast of characters revealed in the special counsel's epic indictment is drawn from the overlapping circles of oligarchs, spooks, and mob figures.

Security 110
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Machine learning: The next transformational technology

IBM Big Data Hub

Machine learning has joined artificial intelligence (AI) as the hottest technology topics of 2018. We asked our expert influencers to share their thoughts on the state of the industry: where it's going, and how and why companies should be adopting machine learning and AI.

article thumbnail

10 Can't-Miss Talks at Black Hat Asia

Dark Reading

With threats featuring everything from nation-states to sleep states, the sessions taking place from March 20-23 in Singapore are relevant to security experts around the world.

article thumbnail

Mitigating the Insider Threat: Lessons From PNB Fraud Case

Data Breach Today

After PNB Incident, Security Practitioners Discuss Technologies to Mitigate Risks Now that it's been confirmed that an insider at Punjab National Bank paved the way for $1.8 billion in fraudulent transactions, the Reserve Bank of India is reiterating the need to strengthen security measures tied to SWIFT interbank transactions, and security experts are offering risk mitigation advice.

Risk 122
article thumbnail

Facebook's Mandatory Anti-Malware Scan Is Invasive and Lacks Transparency

WIRED Threat Level

Facebook is locking users out of their accounts until they download antivirus software that sometimes doesn't even work on their computers.

Security 109
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Databases that learn

IBM Big Data Hub

Machine learning is being used at the heart of next- generation methods for self-driving cars, facial recognition, fraud detection and much more. At IBM, we’re applying machine learning methods to SQL processing so databases can literally learn from experience.

75
article thumbnail

Visit OpenText at the Salesforce World Tour this spring

OpenText Information Management

We are just days away now from the start of a busy spring for Salesforce, its customer and partners. Their World Tour event hits the road in Sydney on March 6th and OpenText will be there amongst the crowds. Meet OpenText, myself and our team at these World Tour stops: Sydney – March 6th, 2018 … The post Visit OpenText at the Salesforce World Tour this spring appeared first on OpenText Blogs.

article thumbnail

Google Filters Annoying Ads But Does Nothing for Security

Data Breach Today

Experts Say New Functionality Ignores Wider Privacy and Security Concerns Google has begun activating a new feature in Chrome that will block 12 types of intrusive advertisements. But some security experts say the online advertising industry needs to solve the malware and privacy problems that have caused users to turn to ad-blocking and anti-tracking tools.

Security 118
article thumbnail

APT37: Inside the Toolset of an Elite North Korean Hacker Group

WIRED Threat Level

Security researcher at FireEye break down the arsenal of APT37, a North Korean hacker team coming into focus as a rising threat.

Security 101
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

SEC Publishes New Guidance on Public Company Cybersecurity Disclosures

Hunton Privacy

On February 21, 2018, the U.S. Securities and Exchange Commission (“SEC”) published long-awaited cybersecurity interpretive guidance (the “Guidance”). The Guidance marks the first time that the five SEC commissioners, as opposed to agency staff, have provided guidance to U.S. public companies with regard to their cybersecurity disclosure and compliance obligations.

article thumbnail

Is your staff’s cyber security awareness up to scratch?

IT Governance

Cyber attacks and data breaches are on the rise, and it’s easy to believe they’re all caused by criminal hackers out for financial gain. However, this isn’t the case. Last quarter, it was found that four of the five leading causes of data breaches are because of human or process error. The failure of staff to follow workplace security regulations, as well as criminal hackers finding more ways to exploit members of staff, is becoming an increasing problem.

article thumbnail

Supreme Court Won't Review CareFirst Data Breach Case

Data Breach Today

Case Now Heads Back to Lower Court for Potential Trial The Supreme Court has declined to review the data breach case involving CareFirst, and so now the class action lawsuit against the health insurer is headed back to a Washington federal trial court. The breach case would have been the first of its kind considered by the nation's highest court.