Sat.Feb 29, 2020 - Fri.Mar 06, 2020

article thumbnail

Securing the Modern Workplace

Data Breach Today

David Wagner of Zix on Rising to the Challenges of Cloud Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.

Security 207
article thumbnail

Walgreens Mobile App Leaks Prescription Data

Threatpost

A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses.

Security 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing the Risks Posed By APIs

Data Breach Today

Shreyans Mehta of Cequence Security on the API Security Landscape APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security.

Risk 205
article thumbnail

HIMSS20 Cancelled Due to Coronavirus

Data Breach Today

Organizers Pull Plug on Event for First Time in Nearly 60 Years Amid Global Spread of Covid-19 For the first time since the event was launched 58 years ago, organizers on Thursday cancelled the Healthcare Information and Management Systems Society Conference, due to the quickly evolving global coronavirus spread.

191
191
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Deception Technology in 2020

Data Breach Today

Attivo's CTO and CMO Share Insight on Industry Trends Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks.

Security 194

More Trending

article thumbnail

Steve Katz on the CISO Role in 2020

Data Breach Today

World's First CISO Shares Insight to Guide Next Generation of Leaders Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.

article thumbnail

SurfingAttack – hacking phones via ultrasonic waves

Security Affairs

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice commands encoded in ultrasonic waves silently activate a mobile phone’s digital assistant. The technique could be used to do several actions such as making phone calls or reading text messages.

Paper 358
article thumbnail

Time and cost savings for Marketing, Finance, and Sales with Jamf

Jamf

The second in a three-part series, we show the many tasks which Jamf solutions can simplify, speed up, automate and even eliminate: for all of your departments. This week: Finance, Marketing and Sales.

Sales 95
article thumbnail

What does the Data Office do? Inside Collibra’s Data Office

Collibra

The data is in, and we all get it: It’s a strategic asset. It’s as vital as Finance managing the budget, or Human Resources recruiting talent. We’re almost at the point where data can be officially listed, even quantified, on the balance sheet as a competitive advantage. . The perception, if not the reality, is now so pervasive that it’s almost a cliché.

Marketing 105
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The role of IT and HR in digital transformation

Jamf

Businesses should not overlook the importance of the employee's digital experience when engaging in a digital transformation.

article thumbnail

Women on the rise in Data Science

IBM Big Data Hub

IBM Data Science and AI Elite team members Mehrnoosh Vahdat and Rachael Dottle were just one month into their IBM careers when they received their first assignment last July. . The project jettisoned them into the heart of Africa, where their banking client was looking to surface new business opportunities across the subcontinent. Their mission was to generate a proof of concept designed to enhance the value of data science and inject the results into workflows for business users and clients.

article thumbnail

Open Regulatory Consultations in the UK and the EU – Have Your Say

HL Chronicle of Data Protection

As highlighted by our new Privacy 2040 initiative, there have never been more opportunities to shape the existing and future privacy and cybersecurity legal framework. Consultations on draft guidance and surveys of various stakeholders are an important step in the production of new rules and materials, and the UK Information Commissioner’s Office (ICO) and the European Data Protection Board (EDPB) currently have a number of open consultations.

article thumbnail

ICO Fines Scottish Company Maximum Amount for Automated Calls

Hunton Privacy

On March 2, 2020, the UK Information Commissioner’s Office (“ICO”) fined CRDNN Limited, a lead generation company, £500,000—the maximum amount available for a breach of the Electronic Communications Regulations (“PECR”). The fine was imposed after CRDNN carried out over 193 million unsolicited automated direct marketing calls relating to window scrappage, window and conservatory sales, boiler sales, and debt management between June and October 2018.

Sales 71
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Financial institutions can gain new AI model risk management capabilities with IBM Watson OpenScale

IBM Big Data Hub

Many financial institutions are rapidly developing and adopting AI models. They’re using the models to achieve new competitive advantages such as being able to make faster and more successful underwriting decisions. However, AI models introduce new risks.

Risk 68
article thumbnail

Hackers gained access to T-Mobile customers and employee personal info

Security Affairs

New problems for the wireless carrier T-Mobile that disclosed a data breach that exposed some of the customers’ personal information. The wireless carrier T-Mobile was victims of a sophisticated cyber attack that targeted its email vendor. A data breach notification published by the telecommunications giant on its website revealed that the security breach impacted both employees and customers. “Our Cybersecurity team recently identified and shut down a malicious attack against our e

Access 363
article thumbnail

The EARN IT Act Is a Sneak Attack on Encryption

WIRED Threat Level

The crypto wars are back in full swing. .

article thumbnail

The Case for Limiting Your Browser Extensions

Krebs on Security

Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. Blue Shield quickly removed the unauthorized code. An investigation determined it was injected by a browser extension installed on the computer of a Blue Shield employee who’d edited the Web site in the past month.

Insurance 333
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DoppelPaymer Ransomware Slams Supplier to Boeing and Tesla

Data Breach Today

Crypto-Locking Malware Gang Dumps Confidential Data Stolen From Visser Precision Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data, and threatening to leak more unless the victim pays a ransom.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

This week, several media reported that agents of the Russian intelligence reportedly went to Ireland to inspect the undersea cables. The Sunday Times reported that Russian intelligence agents have been sent to Ireland to gather detailed information on the undersea cables that connect Europe to North America. The news is alarming, intelligence agencies fear that Russia plans to carry out new cyber-espionage operations by tapping the undersea cables or even sabotage them. “Russia has sent in

Military 363
article thumbnail

Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys

WIRED Threat Level

Encryption flaws in a common anti-theft feature expose vehicles from major manufacturers.

article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. An individual thought to be involved has earned accolades from the likes of Apple , Dell , and Microsoft for helping to find and fix security vulnerabilities in their products.

Passwords 298
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Walgreens Mobile App Exposed Health-Related Messages

Data Breach Today

For Six Days, App May Have Shown Private Messages to Other Users Walgreens' mobile app inadvertently disclosed personal messages to other customers due to an internal application error, revealing some health-related information. The company did not say how many people were affected.

264
264
article thumbnail

The North Korean Kimsuky APT threatens South Korea evolving its TTPs

Security Affairs

Cybaze-Yoroi ZLab analyzed a new implant employed by a North Korea-linked APT group, tracked as Kimsuky, in attacks on South Korea. I ntroduction. Recently we have observed a significant increase in state-sponsored operations carried out by threat actors worldwide. APT34 , Gamaredon , and Transparent Tribe are a few samples of the recently uncovered campaigns, the latter was spotted after four years of apparent inactivity.

IT 363
article thumbnail

How Long Should I Keep This Business Record For?

AIIM

This is perhaps one of the most-asked questions in all of records management. Too often I hear one of two, equally bad answers: Keep Records for Seven years: This seems to be the de facto answer, especially for financial services records. As near as I can tell, this comes from the U.S. Internal Revenue Service rules around when they can audit individual and corporate tax returns.

article thumbnail

Russia Is Learning How to Bypass Facebook's Disinfo Defenses

WIRED Threat Level

Social media platforms have stepped up the fight against Russia's Internet Research Agency—but the IRA is evolving too.

Security 214
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The 'Human Element' in Privacy

Data Breach Today

Gabriel Gumbs of Spirion on Privacy Regulations and Data Classification The RSA 2020 theme was "The Human Element." Gabriel Gumbs of Spirion describes what this means in the era of privacy regulations.

Privacy 246
article thumbnail

CIA Hacking unit APT-C-39 hit China since 2008

Security Affairs

Chinese security firm Qihoo 360 revealed that the US CIA has hacked Chinese organizations in various sectors for the last 11 years. Chinese security firm Qihoo 360 is accusing that the US Central Intelligence Agency (CIA) of having hacked Chinese organizations for the last 11 years. According to the firm, the US cyber spies are targeting various industry sectors and government agencies.

Military 363
article thumbnail

NEW TECH: Juicing up SOAR — SIRP inserts risk-based analysis into network defense playbooks

The Last Watchdog

Security information and event management (SIEM) is evolving and integrating with security orchestration, automation, and response (SOAR) to add real value in the cybersecurity space. Related : How SOAR Is Helping to Address the Cybersecurity Skills Gap SIEM is useful for detecting potential security incidents and triggering alerts, but the addition of a SOAR solution brings these alerts to another level by triaging the data and adopting remediation measures where required.

Risk 191