Sat.Feb 29, 2020 - Fri.Mar 06, 2020

article thumbnail

Securing the Modern Workplace

Data Breach Today

David Wagner of Zix on Rising to the Challenges of Cloud Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.

Security 207
article thumbnail

Walgreens Mobile App Leaks Prescription Data

Threatpost

A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses.

Security 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing the Risks Posed By APIs

Data Breach Today

Shreyans Mehta of Cequence Security on the API Security Landscape APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security.

Risk 205
article thumbnail

HIMSS20 Cancelled Due to Coronavirus

Data Breach Today

Organizers Pull Plug on Event for First Time in Nearly 60 Years Amid Global Spread of Covid-19 For the first time since the event was launched 58 years ago, organizers on Thursday cancelled the Healthcare Information and Management Systems Society Conference, due to the quickly evolving global coronavirus spread.

191
191
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Deception Technology in 2020

Data Breach Today

Attivo's CTO and CMO Share Insight on Industry Trends Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks.

Security 194

More Trending

article thumbnail

Steve Katz on the CISO Role in 2020

Data Breach Today

World's First CISO Shares Insight to Guide Next Generation of Leaders Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.

article thumbnail

SurfingAttack – hacking phones via ultrasonic waves

Security Affairs

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice commands encoded in ultrasonic waves silently activate a mobile phone’s digital assistant. The technique could be used to do several actions such as making phone calls or reading text messages.

Paper 145
article thumbnail

Time and cost savings for Marketing, Finance, and Sales with Jamf

Jamf

The second in a three-part series, we show the many tasks which Jamf solutions can simplify, speed up, automate and even eliminate: for all of your departments. This week: Finance, Marketing and Sales.

Sales 95
article thumbnail

What does the Data Office do? Inside Collibra’s Data Office

Collibra

The data is in, and we all get it: It’s a strategic asset. It’s as vital as Finance managing the budget, or Human Resources recruiting talent. We’re almost at the point where data can be officially listed, even quantified, on the balance sheet as a competitive advantage. . The perception, if not the reality, is now so pervasive that it’s almost a cliché.

Marketing 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The role of IT and HR in digital transformation

Jamf

Businesses should not overlook the importance of the employee's digital experience when engaging in a digital transformation.

article thumbnail

Women on the rise in Data Science

IBM Big Data Hub

IBM Data Science and AI Elite team members Mehrnoosh Vahdat and Rachael Dottle were just one month into their IBM careers when they received their first assignment last July. . The project jettisoned them into the heart of Africa, where their banking client was looking to surface new business opportunities across the subcontinent. Their mission was to generate a proof of concept designed to enhance the value of data science and inject the results into workflows for business users and clients.

article thumbnail

Open Regulatory Consultations in the UK and the EU – Have Your Say

HL Chronicle of Data Protection

As highlighted by our new Privacy 2040 initiative, there have never been more opportunities to shape the existing and future privacy and cybersecurity legal framework. Consultations on draft guidance and surveys of various stakeholders are an important step in the production of new rules and materials, and the UK Information Commissioner’s Office (ICO) and the European Data Protection Board (EDPB) currently have a number of open consultations.

article thumbnail

ICO Fines Scottish Company Maximum Amount for Automated Calls

Hunton Privacy

On March 2, 2020, the UK Information Commissioner’s Office (“ICO”) fined CRDNN Limited, a lead generation company, £500,000—the maximum amount available for a breach of the Electronic Communications Regulations (“PECR”). The fine was imposed after CRDNN carried out over 193 million unsolicited automated direct marketing calls relating to window scrappage, window and conservatory sales, boiler sales, and debt management between June and October 2018.

Sales 71
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Financial institutions can gain new AI model risk management capabilities with IBM Watson OpenScale

IBM Big Data Hub

Many financial institutions are rapidly developing and adopting AI models. They’re using the models to achieve new competitive advantages such as being able to make faster and more successful underwriting decisions. However, AI models introduce new risks.

Risk 68
article thumbnail

The Case for Limiting Your Browser Extensions

Krebs on Security

Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code. An investigation determined it was injected by a browser extension installed on the computer of a Blue Shield employee who’d edited the Web site in the past month.

Insurance 305
article thumbnail

DoppelPaymer Ransomware Slams Supplier to Boeing and Tesla

Data Breach Today

Crypto-Locking Malware Gang Dumps Confidential Data Stolen From Visser Precision Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data, and threatening to leak more unless the victim pays a ransom.

article thumbnail

NEW TECH: Juicing up SOAR — SIRP inserts risk-based analysis into network defense playbooks

The Last Watchdog

Security information and event management (SIEM) is evolving and integrating with security orchestration, automation, and response (SOAR) to add real value in the cybersecurity space. Related : How SOAR Is Helping to Address the Cybersecurity Skills Gap SIEM is useful for detecting potential security incidents and triggering alerts, but the addition of a SOAR solution brings these alerts to another level by triaging the data and adopting remediation measures where required.

Risk 191
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How Long Should I Keep This Business Record For?

AIIM

This is perhaps one of the most-asked questions in all of records management. Too often I hear one of two, equally bad answers: Keep Records for Seven years: This seems to be the de facto answer, especially for financial services records. As near as I can tell, this comes from the U.S. Internal Revenue Service rules around when they can audit individual and corporate tax returns.

article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. An individual thought to be involved has earned accolades from the likes of Apple , Dell , and Microsoft for helping to find and fix security vulnerabilities in their products.

Passwords 276
article thumbnail

Walgreens Mobile App Exposed Health-Related Messages

Data Breach Today

For Six Days, App May Have Shown Private Messages to Other Users Walgreens' mobile app inadvertently disclosed personal messages to other customers due to an internal application error, revealing some health-related information. The company did not say how many people were affected.

264
264
article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.

Cloud 185
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The EARN IT Act Is a Sneak Attack on Encryption

WIRED Threat Level

The crypto wars are back in full swing. .

article thumbnail

Hackers gained access to T-Mobile customers and employee personal info

Security Affairs

New problems for the wireless carrier T-Mobile that disclosed a data breach that exposed some of the customers’ personal information. The wireless carrier T-Mobile was victims of a sophisticated cyber attack that targeted its email vendor. A data breach notification published by the telecommunications giant on its website revealed that the security breach impacted both employees and customers. “Our Cybersecurity team recently identified and shut down a malicious attack against our e

Access 145
article thumbnail

The 'Human Element' in Privacy

Data Breach Today

Gabriel Gumbs of Spirion on Privacy Regulations and Data Classification The RSA 2020 theme was "The Human Element." Gabriel Gumbs of Spirion describes what this means in the era of privacy regulations.

Privacy 246
article thumbnail

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

The Last Watchdog

Wider use of Internet of Things systems that can make daily living safer, healthier and more convenient is on the immediate horizon. However, to fully capture the benefits of an IoT-centric economy, a cauldron of privacy and security concerns must first be quelled. Related : The promise and pitfalls of IoT At the technology level, two fundamental things must get accomplished.

IoT 157
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

[Podcast] A “Carnegie” Approach to Change Management

AIIM

In 1936, Dale Carnegie's " How to Win Friends and Influence People " first published. Since then, it's become one of the best-selling books of all time with over 15 million copies sold! What makes this self-help book one of the most influential of our time? Farnam Street offers a fantastic summary of some of the book's most important points , including: Advice on Dealing with People: When dealing with people, let us remember we are not dealing with creatures of logic.

Libraries 141
article thumbnail

CIA Hacking unit APT-C-39 hit China since 2008

Security Affairs

Chinese security firm Qihoo 360 revealed that the US CIA has hacked Chinese organizations in various sectors for the last 11 years. Chinese security firm Qihoo 360 is accusing that the US Central Intelligence Agency (CIA) of having hacked Chinese organizations for the last 11 years. According to the firm, the US cyber spies are targeting various industry sectors and government agencies.

Military 145
article thumbnail

Redefining Security Analytics

Data Breach Today

Chronicle's Anton Chuvakin on How to Fill the Gaps for Analysts There are glaring holes in how enterprises currently tackle security analytics, and by redefining the approach, the analyst's role can be transformed. Dr. Anton Chuvakin of Chronicle explains how.

Analytics 243