Sat.Dec 07, 2019 - Fri.Dec 13, 2019

article thumbnail

Collaboration Platforms: Great for Collaborating, Problematic for Ediscovery and Compliance

Hanzo Learning Center

Most knowledge work these days demands some form of collaboration. You draft a document; your colleagues comment on it and make suggestions for how it could be better. You chat on Slack about how to incorporate those comments. You check off the task in your project management software and let your associate know that the project is ready for her to take over.

article thumbnail

Toys “R” Us Is Back—Now With More Surveillance!

WIRED Threat Level

Reports about the toy store using cameras to track shoppers caused an uproar, but the companies behind the tech insist their systems are trained to ignore kids.

Privacy 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why it’s now crucial to preserve PKI, digital certificates as the core of Internet security

The Last Watchdog

For decades, the cornerstone of IT security has been Public Key Infrastructure, or PKI , a system that allows you to encrypt and sign data, issuing digital certificates that authenticate the identity of users. Related: How PKI could secure the Internet of Things If that sounds too complicated to grasp, take a look at the web address for the home page of this website.

Security 160
article thumbnail

Is your Organization Suffering From Third-Party "Compliance Drift"?

Data Breach Today

Countermeasures to Keep your Compliance On Track and as Originally Designed Third-party vendors accessing your most critical systems and networks can also bring in security incidents along with all those wonderful things they promised in the sales presentation.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Passwordless? Imagining the Future of Authentication

The Security Ledger

The average employee in the workplace has 191 passwords. Will we ever rid ourselves of them and, if so, how? Gerald Beuchelt, the Chief Information Security Officer at LogMeIn talks about how changes in authentication may deliver a passwordless future. The post Passwordless? Imagining the Future of Authentication appeared first on The Security. Read the whole entry. » Related Stories Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home Explained: Two-

More Trending

article thumbnail

Ransomware at Colorado IT Provider Affects 100+ Dental Offices

Krebs on Security

A Colorado company that specializes in providing IT services to dental offices suffered a ransomware attack this week that is disrupting operations for more than 100 dentistry practices, KrebsOnSecurity has learned. Multiple sources affected say their IT provider, Englewood, Colo. based Complete Technology Solutions (CTS), was hacked, allowing a potent strain of ransomware known as “Sodinokibi” or “rEvil” to be installed on computers at more than 100 dentistry businesses

article thumbnail

GDPR Violation: German Privacy Regulator Fines 1&1 Telecom

Data Breach Today

$11 Million Fine for Authentication Shortcomings at Telecommunications Provider One of the largest fines to date for violating the EU's General Data Protection Regulation has been announced by Germany's federal privacy and data protection watchdog, the BfDI, against 1 & 1 Telecommunications, in part for inadequate authentication mechanisms. The company plans to appeal.

Privacy 168
article thumbnail

Beginners’ Guide to the Fundamentals of Flowcharting in Business Process Management

AIIM

Flowcharting is one of the first tools used in analyzing an existing business process. The purpose of a flowchart is to document the tasks within a particular process, and their sequencing, visually. How Is Flowcharting Used in Business Process Management? Once the flowchart is created, it can be used for a number of different purposes. Here are some common use-cases for flowcharting in Business Process Management.

Insurance 156
article thumbnail

Insights about the first five years of Right to be Forgotten requests at Google

Elie

The. “Right to be Forgotten” (RTBF). is a landmark European ruling that governs the delisting of personal information from search results. This ruling establishes a right to privacy, whereby individuals can request that search engines delist URLs across the Internet that contain “inaccurate, inadequate, irrelevant or excessive” information uncovered by queries containing the name of the requester.

Privacy 118
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Great $50M African IP Address Heist

Krebs on Security

A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a three-year investigation by a U.S.

Marketing 188
article thumbnail

Intel Chips Vulnerable to 'Plundervolt' Attack

Data Breach Today

Dropping Voltage to CPUs Can Force Sensitive Data Disclosure Intel issued a firmware update on Tuesday to mitigate an attack developed by researchers, dubbed Plundervolt, which uses voltage fluctuations to reveal secrets such as encryption keys. The findings are the latest bad news for Intel as researchers have dug deep into its chip architecture.

article thumbnail

[Podcast] What are the experts saying about the changing role of Records Management?

AIIM

It’s no secret that the business landscape is changing. Here at AIIM, we’ve talked a lot about how the volume, variety, and value of business information has - for lack of a better term – exploded in recent years. According to our research, the volume of business data is expected to go from X to 4.2X in just the next two years! As the volume, velocity, and variety of enterprise information continues to grow, so does the need for well-thought-out and evolving strategies for records management.

article thumbnail

Welcome to the era of the industrial cloud

OpenText Information Management

The industrial Internet of Things (IIoT) is having a profound effect on how manufacturing organizations share information. The explosion in connected industrial equipment means that companies have to think about how they archive sensor-based information coming from these devices, how they securely move this sensor data from one location to another, and how they derive … The post Welcome to the era of the industrial cloud appeared first on OpenText Blogs.

Cloud 115
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Patch Tuesday, December 2019 Edition

Krebs on Security

Microsoft today released updates to plug three dozen security holes in its Windows operating system and other software. The patches include fixes for seven critical bugs — those that can be exploited by malware or miscreants to take control over a Windows system with no help from users — as well as another flaw in most versions of Windows that is already being exploited in active attacks.

Libraries 151
article thumbnail

City of Pensacola Recovering From Ransomware Attack

Data Breach Today

FBI: Incident Doesn't Appear Related to Last Week's Naval Air Base Shooting The city of Pensacola, Florida, on Tuesday was still recovering from a Saturday ransomware attack that occurred just one day after a shooting incident at Naval Air Station Pensacola. But the FBI reports that it has not identified a connection between the incidents.

article thumbnail

This Alleged Bitcoin Scam Looked a Lot Like a Pyramid Scheme

WIRED Threat Level

Five men face federal charges of bilking investors of $722 million by inviting them to buy shares in bitcoin mining pools. .

Mining 121
article thumbnail

Data monetization: driving the new competitive edge in retail

CGI

Data monetization: driving the new competitive edge in retail. ravi.kumarv@cgi.com. Mon, 12/09/2019 - 04:28. Retailers are fully aware that their future relies largely on their ability to use data efficiently. However, in today’s dynamic and highly competitive retail sector, retailers need to accelerate their plans and commit resolutely to the path of data monetization.

Retail 96
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

CISO Magazine Honors KrebsOnSecurity

Krebs on Security

CISO Magazine , a publication dedicated to covering issues near and dear to corporate chief information security officers everywhere, has graciously awarded this author the designation of “ Cybersecurity Person of the Year ” in its December 2019 issue. KrebsOnSecurity is grateful for the unexpected honor. But I can definitely think of quite a few people who are far more deserving of this title.

article thumbnail

Health Data Breach Tally: Trends in 2019

Data Breach Today

Hacking Attacks, Business Associate Incidents Were Common The federal tally of health data breaches shows that hacking attacks and incidents involving business associates dominated this year. Here's an analysis of all the latest trends.

article thumbnail

How to Plan a Centralized File Collection – Part 1

TAB OnRecord

One of the most common questions in records management is whether to store records in multiple locations or in a single, centralized file room. Centralizing records has many benefits, but whether it is the right move depends on your organization and the specific needs of your team. If you have explored the pros and cons and are ready to move forward with centralization, our three part blog post offers tips and techniques to make your centralization project a success.

article thumbnail

Vietnam-linked Ocean Lotus hacked BMW and Hyundai networks

Security Affairs

Alleged Vietnamese Ocean Lotus (APT32) hackers breached the networks of the car manufacturers BMW and Hyundai to steal automotive trade secrets. According to German media, hackers suspected to be members of the Vietnam-linked APT Ocean Lotus ( APT32 ) group breached the networks of the car manufacturers BMW and Hyundai. The intrusion aimed at stealing automotive trade secrets. “The attack the alleged Vietnamese hacker group began in the spring of 2019.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

City of Pensacola Hit By Cyberattack Following Shooting

Adam Levin

Pensacola, FL was hit by a cyberattack in the wake of what has been described as a terrorist shooting. “The city of Pensacola is experiencing a cyberattack that began this weekend that is impacting our city network, including phones and email at City Hall and some of our other buildings,” said Mayor Grover Robinson. . The cyberattack began early Saturday morning days after a shooting at the nearby Pensacola Naval Air Station that left four dead and eight wounded.

article thumbnail

Joker's Stash Celebrates Turkey Day With Stolen Card Data

Data Breach Today

Fraudsters Invited to Dine Out on 460,000 Stolen Turkish Payment Cards The notorious Joker's Stash carder marketplace has recently listed for sale 460,000 records, including four "Turkey-Mix" batches that feature never-before-seen payment card data that traces to Turkey's 10 largest banks, says cybersecurity firm Group-IB.

Sales 144
article thumbnail

Five years of the Right to Be Forgotten

Elie

The “Right to be Forgotten” is a privacy ruling that enables Europeans to delist certain URLs appearing in search results related to their name. In order to illuminate the effect this ruling has on information access, we conducted a retrospective measurement study of 3.2 million URLs that were requested for delisting from Google Search over five years.

Privacy 83
article thumbnail

Top integration challenges in healthcare IT

OpenText Information Management

In a recent blog, I shared some data points about the importance of enterprise application integration and the challenges with integrating data sources. The healthcare industry in particular faces similar interoperability challenges but with patient-impacting outcomes. With mergers and acquisitions increasing, healthcare IT departments find themselves with a wide variety of processes, systems, and applications. … The post Top integration challenges in healthcare IT appeared first on OpenTe

IT 87
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

More than 44 million Microsoft user accounts are exposed to hack

Security Affairs

Microsoft revealed that 44 million Microsoft Azure AD and Microsoft Services accounts were vulnerable to account hijacking. Microsoft discovered that 44 million Microsoft Azure AD and Microsoft Services accounts were vulnerable to account hijacking because of using of compromised passwords. Experts from the Microsoft threat research team analyzed a database containing 3 billion leaked credentials from different security breaches. “The Microsoft identity threat research team checks billions

article thumbnail

Decryptor Bug Means Ryuk Victims Stuck in Ransomware Rut

Data Breach Today

Emsisoft Tool Can Fix Ineffective Attacker-Supplied Decryption - But Back Up the Files Emsisoft has spotted a buggy decryptor for the Ryuk ransomware and developed a custom tool to fix it. But victims will still have to pay the ransom to recover files.

article thumbnail

Calculating the Return on Investment for Adept Engineering Document Management

Synergis Software

Almost everyone seems to know a horror story about a big IT project that became the software equivalent of a Money Pit (a house that needs one expensive repair after another). Just as new products or projects must generate a good return on investment (ROI), so must IT projects. Synergis has worked closely with several of its largest and most experienced customers to quantify the value of Adept in an engineering workgroup.

Access 85