Sat.May 12, 2018 - Fri.May 18, 2018

article thumbnail

Why your organisation needs cyber incident response management

IT Governance

With cyber attacks one of the top threats to organisations , it’s crucial to have the right measures in place to protect yourself from an attack. However, cyber threats are also becoming more sophisticated and persistent, and protection isn’t always enough. Organisations should have a plan in place to respond to an attack, enabling them to contain it and ultimately control the costs and exposure.

article thumbnail

White House Eliminates Cybersecurity Position

Schneier on Security

The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Clearing the Complication - Making Machine Learning and Artificial Intelligence Accessible and Useful

AIIM

These days it feels almost impossible to have a conversation with anyone involved in the world of Information Management without bringing up machine learning and artificial intelligence. Everyone is talking about it, everyone has an opinion, everyone claims to be doing it — or at least thinking about doing it. AI is part of the popular zeitgeist, entering our lives in the form of autonomous vehicles on our roads, Alexa in our homes, and a burgeoning AI arms race between rival world powers.

article thumbnail

‘Tis the season of purge and replace for records managers

OpenText Information Management

This time last year, when I managed customer support and consulting for an ECM reseller, there was a high level of tension within our school board clients. Close to the end of the school year, records managers start digging through the various physical and digital records stores in preparation for next year. During this time … The post ‘Tis the season of purge and replace for records managers appeared first on OpenText Blogs.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Report: Facebook App Exposed 3 Million More Users' Data

Data Breach Today

Revenge of the Personality Test, Take Two Researchers at the University of Cambridge, via a myPersonality test on Facebook, reportedly used data from 3 million users to power a spin-off company that delivered targeted advertising services. Facebook says the app is one of 200 that it's suspended for suspicious data handling practices.

IT 180

More Trending

article thumbnail

How to solve four common challenges when outsourcing records to the cloud Part 1

TAB OnRecord

In some ways, moving to an outsourced cloud provider is a bit like outsourcing the storage of your physical files – whether to an active records center or to a box storage provider. In both cases, the files themselves now reside within facilities owned and managed by the outsourcing provider. In both cases you are relying on another party to help ensure the privacy and security of your records.

Cloud 99
article thumbnail

Digital Leaders Tackle Information Chaos at its Origins

AIIM

In a recent AIIM Industry Watch survey -- State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve -- I asked this question -- “ Agree or Disagree : Digitizing and standardizing business inputs is one of the key bottlenecks for Digital Transformation.” The results are clear: Information chaos needs to be tackled at its origins.

article thumbnail

Chili's Speed Question: To Notify or Not to Notify Quickly?

Data Breach Today

Restaurant Chain Reports Breach But Has Yet to Confirm Details Chili's Grill & Bar is warning customers that an unknown number of payment cards were compromised at an unknown number of corporate-owned locations earlier this year for a period of time it suspects lasted two months. Should Chili's have waited to alert customers until it had more information?

IT 151
article thumbnail

NHS warns patients they could lose text alerts as GDPR deluge continues

The Guardian Data Protection

Health service joins UK firms in rushing to comply with new data protection rules The National Health Service is texting patients to warn they could lose alerts about hospital and doctor appointments, joining the deluge of more than 1bn “GDPR” messages currently hitting personal inboxes to meet an EU deadline this week. GDPR, which stands for General Data Protection Regulation , has been described as the biggest overhaul of online privacy since the birth of the internet, and comes into force on

GDPR 101
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Senators Grill Cambridge Analytica Whistleblower Christopher Wylie

WIRED Threat Level

Christopher Wylie testified before the Senate Judiciary Committee Wednesday that Cambridge Analytica specialized in "disinformation, spreading rumors, *kompromat*, and propaganda.".

article thumbnail

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps. Fast-forward a little bit and you’ll remember telling your teachers that your dog really did eat your homework.

IT 80
article thumbnail

Health Data Breach Tally: The Latest Additions

Data Breach Today

Largest Incident: Break-In at California State Agency That Affected 582,000 The number of health data breach victims added to the official federal tally so far in 2018 has doubled in recent weeks to more than 2 million. The largest breach of the year so far involved a break-in at a California government office.

article thumbnail

Facebook lets advertisers target users based on sensitive interests

The Guardian Data Protection

Social network categorises users based on inferred interests such as Islam or homosexuality Facebook allows advertisers to target users it thinks are interested in subjects such as homosexuality, Islam or liberalism, despite religion, sexuality and political beliefs explicitly being marked out as sensitive information under new data protection laws.

IT 98
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Get Ready for 'WannaCry 2.0'

Dark Reading

Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.

95
article thumbnail

Gruesome Jihadi Content Still Flourishes on Facebook and Google+

WIRED Threat Level

Despite improvements to algorithmic filtering, Facebook and Google+ still host scores of ISIS and related content and accounts that sometimes stay up for months.

article thumbnail

Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people. The company has blamed the breach on a former employee, who accessed personal data from several of Nuance's clients.

article thumbnail

Gillian Triggs joins call for digital rights reforms after brush with data's dark side

The Guardian Data Protection

Digital Rights Watch warns of ‘systematic and wilful degradation of our human rights online’ • Sign up to receive the top stories every morning Gillian Triggs, Australia’s controversial former human rights commissioner has had a personal experience of the dangers of data retention laws. She was caught out, she reveals in a new report on Digital Rights, when she agreed to provide access to 24 hours of her digital life as part of an experiment at the Melbourne Writers Festival in 2017.

Access 92
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cracking 2FA: How It's Done and How to Stay Safe

Dark Reading

Two-factor authentication is a common best security practice but not ironclad. Here's how it can be bypassed, and how you can improve security.

IT 86
article thumbnail

Details on a New PGP Vulnerability

Schneier on Security

A new PGP vulnerability was announced today. Basically, the vulnerability makes use of the fact that modern e-mail programs allow for embedded HTML objects. Essentially, if an attacker can intercept and modify a message in transit, he can insert code that sends the plaintext in a URL to a remote website. Very clever. The EFAIL attacks exploit vulnerabilities in the OpenPGP and S/MIME standards to reveal the plaintext of encrypted emails.

article thumbnail

Noose Tightens Around Dark Overlord Hacking Group

Data Breach Today

Serbia Makes Arrest; UK Close to Sentencing Another The noose appears to be tightening around the Dark Overlord, a group of international hackers who have stolen and held for ransom sensitive information from dozens of companies, healthcare organizations and U.S. public schools. Serbian police say they've arrested a person in cooperation with the FBI and U.K. authorities.

117
117
article thumbnail

Facebook suspends 200 apps as part of investigation into data misuse

The Guardian Data Protection

After Cambridge Analytica fallout, the company is investigating apps that had access to large amounts of data before 2014 Facebook said it had suspended roughly 200 apps as part of its investigation into the potential misuse of personal data on the social network, the latest fallout from the Cambridge Analytica privacy scandal. In an announcement on Monday, the company also said that it had investigated thousands of apps two months after reporting by the Observer and the Guardian revealed that m

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

NIS Regulations: Government publishes guidance for competent authorities

IT Governance

With the Directive on security of network and information systems (NIS Directive) to be transposed into national laws across the EU by 9 May 2018, the UK government has published guidance for those tasked with its enforcement. The UK government has transposed the NIS Directive into national law, and officially titled it The Network and Information Systems Regulations 2018 (NIS Regulations).

article thumbnail

Critical PGP Vulnerability

Schneier on Security

EFF is reporting that a critical vulnerability has been discovered in PGP and S/MIME. No details have been published yet, but one of the researchers wrote : We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past.

article thumbnail

Uninstall or Disable PGP Tools, Security Researchers Warn

Data Breach Today

Exploitable Vulnerabilities Could Reveal Plaintext of Encrypted Emails European computer security researchers say they have discovered vulnerabilities that relate to two techniques used to encrypt emails: PGP and S/MIME. Security experts recommend all PGP users immediately delete or disable their PGP tools, pending a full fix.

Security 124
article thumbnail

What are all these GDPR emails filling up your inbox?

The Guardian Data Protection

Websites are desperately trying to maintain their links to users before the 24 May deadline, when consumers rather than companies will be in charge of personal data ‘Hey there Field Left Blank. So listen, budski, my man, my main man. I know we’ve been sending you spammy emails about cheap holiday deals five days a week. For the last five years. Yeah, maybe we took a few liberties with that.

GDPR 83
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

On May 8, Georgia Governor Nathan Deal announced that he was vetoing Senate Bill 315 (“SB 315” or “the bill”), cybersecurity legislation that would have expanded the criminalization of “unauthorized computer access” to capture, in addition to traditional hacking, activity that opponents warned is necessary to robust private and public sector cyber defense.

article thumbnail

Jigsaw's Project Shield Will Protect Campaigns From Online Attacks

WIRED Threat Level

Project Shield already defends journalists and human rights groups from DDoS attacks. Now, Jigsaw will help political campaigns out as well.

article thumbnail

As Payments Speed Up, How Can Fraud Be Minimized?

Data Breach Today

Knowing as many details as possible about the customer, the payment and the recipient is a critical component of stopping fraud as payments become faster, says anti-fraud specialist David Barnhardt.

113
113