You Are Browsing ‘Security ’ Category

Comments Off on Facebook slapped with class action suit over privacy, data gathering infractions
(Source: SC Magazine) “Facebook has repeatedly failed to uphold its own privacy agreements and policies, and it's brazenly neglected the data security of the billions of those who use its social media service,” Steve Berman, managing partner of Hagens Berman law firm, which is representing plaintiffs in the suit, said in a release. “Instead of ......
Comments Off on Netwrix Experts to Speak about IT Security Basics at RSA Conference San Francisco
(Source: IT Business Net (press release)) IRVINE, Calif., April 10, 2018 /PRNewswire/ -- Netwrix Corporation, provider of a visibility platform for data security and risk mitigation, announced today that Netwrix is exhibiting at RSA Conference in San Francisco, April 16 20, 2018. Netwrix professionals will host an educational session titled "Back to IT Security Basics: ......
Comments Off on Verizon report: Ransomware runs rampant, responsible for 39% of malware-caused breaches
(Source: SC Magazine) Itsik Mantin, head of data security research at Imperva, said in comments the proliferation of ransomware is "anything but surprising," considering that the ransomware economy is "going through industrialization, allowing attackers to [launch] campaigns from building blocks they purchase or obtain in dark net forums..."....
Comments Off on AI could help reduce the administrative costs of health care
(Source: VentureBeat) And industry experts believe we can reduce a lot of this spending with the help of artificial intelligence. “A number of recent studies have found that [health care] administrative costs [in the U.S.] continue to rise and or remain higher than other countries,” says Pamela Hepp, an expert in data security, health care regulation, ......
Comments Off on Chunghwa Telecom Upgrades to VCAS Ultra from Verimatrix to Secure New Premium UHD/4K Services
(Source: PR Newswire (press release)) "As we enter this exciting new domain of premium video delivery, we couldn't be more pleased to already have such a deep level of confidence in our securityframework and trust in Verimatrix to navigate us through the complex requirements associated with UHD/4K services," said Dr. Chih-Cheng Lo, deputy principal ......
Comments Off on Hackers abused Cisco flaw to warn Iran and Russia: ‘Don’t mess with our elections’
(Source: CSO Online) That is what it was called back in an “informational” Cisco Security Advisory issued in 2017. Cisco's Security Advisory issued on Friday, however, lists it as a critical vulnerability. [ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost ......
Comments Off on Alabama’s Data Breach Law
(Source: MENAFN.COM) All U.S states now have laws about data security and what to do when there's a data breach. Alabama recently was the 50thstate to add such alaw, and it takes effect on May 1, 2018. Here are its highlights. Who The Law Applies To. The law applies to anyone who acquires or uses sensitive personally identifying information....
Comments Off on How Blockchain Can Improve the Pharma Manufacturing Supply Chain
(Source: Disruptor Daily (blog)) The overall benefits of blockchain are enormous, from data security throughout the supply chain to full regulatory compliance throughout the industry. However, creating a truly integrated, global-scale operation is no easy task especially for every pharmaceutical company out there. If a company is interested in blockchain, ......
Comments Off on Machine learning: Security product or feature?
(Source: CSO Online) Since then, big data security analytics sort of morphed into machine learning, which led to the creation of a new security technology category: user and entity behavior analytics (UEBA). UEBA was designed to monitor user behaviors such as logins, remote access, network connections, etc., model "normal" behavior, and ......
Comments Off on Facebook Sought Medical Data. Yes, This Should Raise Red Flags.
(Source: Futurism) There's also a potential HIPAA transgression here in the sense of data security. Facebook would have allegedly matched the anonymous health data with patients' Facebook profiles using a technique called “hashing.” This method scrambles data, such as names, using a specific algorithm, and then searches for matches ......