article thumbnail

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. government computers Kaspersky Lab security software, developed in Russia, it took months longer than its predecessors to publicly unveil a computer security stance.

article thumbnail

Meet Boston’s First Chief Information Security Officer

Sailpoint

Walsh announced Greg McCarthy’s appointment as the city’s first chief information security officer (CISO). McCarthy will lead the cybersecurity team within the Department of Innovation and Technology. The city’s cybersecurity program is now ten years old, and I have been a part of it for nine.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

A secure approach to generative AI with AWS

AWS Machine Learning - AI

Because their data and model weights are incredibly valuable, customers require them to stay protected, secure, and private, whether that’s from their own administrator’s accounts, their customers, vulnerabilities in software running in their own environments, or even their cloud service provider from having access.

article thumbnail

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. This breadth of information can be much more valuable on the black market—sometimes up to $30 per record—than the typical consumer financial profile , which sells for $10 to $12.

Security 189
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Apple patches nasty security bugs, HBO Max suddenly removes content, and a16z backs Neumann’s next thing

TechCrunch

Apple’s big security bug : Time to update your Apple devices! security issues that attackers seem to already be actively exploiting. Hi, I’m the security editor here, a.k.a. TechCrunch’s Bearer of Bad News, and I oversee the security desk. This week the company shipped critical patches that fix two (!)

Spyware 220
article thumbnail

Container Security – What Are Containers? – Part 1

Xebia

It could be from development to production or the testing environment (Paul Rubens, 2017, ref.2). For security, they are extremely helpful in preserving deterministic application behaviourThat’sne coI’lltly. This makes it a considerable authority in defining container technology standards (Paul Rubens, 2017, ref.2).

Linux 130