article thumbnail

National Public Data Published Its Own Passwords

Krebs on Security

KrebsOnSecurity has learned that another NPD data broker which shares access to the same consumer records inadvertently published the passwords to its back-end database in a file that was freely available from its homepage until today. In April, a cybercriminal named USDoD began selling data stolen from NPD. NPD acknowledged the intrusion on Aug.

Passwords 359
article thumbnail

Delta Air Lines' IT Outage Lawsuit: CrowdStrike Countersues

Data Breach Today

Vendor Blames Delta's Outage Severity on Its 'Own Response and IT Infrastructure' CrowdStrike has countersued customer Delta Air Lines, accusing the airline of employing a lawsuit and seeking damages in "a desperate attempt to shift blame" for Delta's own IT inadequacies having exacerbated its outage, unlike "other major airlines" that quickly resumed (..)

IT 302
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Rules for Shipbuilding Focus on IT/OT Cybersecurity

Data Breach Today

New IACS Rules to Secure Onboard Digital Systems, Equipment Go Into Effect July 1 IT and OT security experts say threats to shipping underscore the need for more stringent regulations for passenger, cargo and high-speed vessels by the International Association of Classification Societies.

article thumbnail

Warnings Mount Over Fake North Korean IT Workers

Data Breach Today

German Domestic Intelligence Agency Says German Companies Have Fallen For Scam The German federal domestic intelligence agency is adding to warnings over North Korean IT workers obtaining remote work in Western tech companies. The world's most secretive and repressive regime looks for multiple ways to circumvent strict economic sanctions.

IT 288
article thumbnail

What Is Entity Resolution? How It Works & Why It Matters

Entity Resolution Sometimes referred to as data matching or fuzzy matching, entity resolution, is critical for data quality, analytics, graph visualization and AI. Learn what entity resolution is, why it matters, how it works and its benefits. With it, you can accurately identify and link entities (people, organizations, vessels, etc.)

article thumbnail

FBI Says It Dismantled 'Likely the World's Largest Botnet'

Data Breach Today

US-Led Operation Disrupts 911 S5 Botnet in Global Crackdown FBI Director Christopher Wray said the U.S.

IT 288
article thumbnail

CrowdStrike Rejects Delta's Negligence Claims Over IT Outage

Data Breach Today

Cybersecurity Firm Says Airline Rebuffed Help, Questions Its Incident Response CrowdStrike has dismissed claims of negligence leveled at it by Delta Air Lines, which is threatening to sue after a faulty security software update led to days of IT disruption.

IT 267
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

5 Signs Its Time to Replace Your Homegrown Analytics

If you built your analytics in house, chances are your basic features are no longer enough for your end users. Is it time to move on to a more robust analytics solution with more advanced capabilities? Follow this free guide for tips on making the build to buy transition.

article thumbnail

Entity Resolution: Your Guide to Deciding Whether to Build It or Buy It

Adding high-quality entity resolution capabilities to enterprise applications, services, data fabrics or data pipelines can be daunting and expensive. Organizations often invest millions of dollars and years of effort to achieve subpar results. This guide will walk you through the requirements and challenges of implementing entity resolution.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

10 Rules for Managing Apache Kafka

While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

Blueprint to Modernize Analytics

As the value of modern in-app analytics becomes clearer, more companies are making analytics a priority before it becomes a problem. The longer you wait to modernize your application’s analytics, the harder you’ll eventually feel the pain of lost customers and missed revenue. If it sounds like a daunting task, that's because it is.

article thumbnail

10 Rules to More Streamlined Data Modeling

Apache Kafka is a powerful piece of software that can solve a lot of problems. Like most libraries and frameworks, you get out of it what you put into it. Learn 10 rules that will help you perfect your Kafka system to get ahead.

article thumbnail

Use Cases for Apache Cassandra®

In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid.