Breaches

6a1fbf6a6315721b9e8931e69112c21e

Variations in State Data Breach Disclosure Laws Complicate Compliance

September 26, 2018 Added by:John Moran

New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge

September 12, 2018 Added by:Liviu Arsene

Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.

Comments  (0)

130c36bd4e626734d3c3de4e43cdbb8c

Busting the VDI Security Myth

September 11, 2018 Added by:Tal Zamir

Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user’s device, they control the VDI resources.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Why Admin Rights Removal Is only the First Step towards Data Protection

September 11, 2018 Added by:Andrew Avanessian

Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.

Comments  (0)

8d109f28623b3d0bd57500ba35f914e1

Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?

September 06, 2018 Added by:Rishi Bhargava

SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.

Comments  (0)

26104e7f12ca49e1208007765787726d

New Payment Tech, New Security Challenges

September 04, 2018 Added by:Simon Blake-Wilson

New apps and technologies present payment providers with new types of threats.

Comments  (0)

E51e95052d67c3df896465b1249e9432

Is User Training the Weakest Link for Your Email Security Approach?

June 28, 2018 Added by:Dennis Dillman

Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower.

Comments  (0)

041c3f1348bafada6586f01a609f51df

Can Organisations Turn Back Time after a Cyber-Attack?

May 23, 2018 Added by:Patrice Puichaud

With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.

Comments  (0)

F7d0f3bd3db3ac1238b1165855b93542

The Only Gold Russia Can Win at the Winter Olympics Is for Cyber-Hacking

February 09, 2018 Added by:Ross Rustici

Each time Russia leaks information in connection to doping commissions, it garners less news attention and is increasingly being viewed as a failed operation.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

The Weakest Link In Banking Security – ATMs

October 03, 2017 Added by:Vanishree Rao

We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Convenience Comes at a Steep Price: Password Management Systems & SSO

July 12, 2017 Added by:Alexandre Cagnoni

Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).

Comments  (0)

0756e5785a4308aa22f17fa1757680bf

How Does Samba Compare to WannaCry?

July 05, 2017 Added by:Rotem Iram

Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Social Security Administration’s Second Attempt at 2FA Fails Federal Government’s Own Standards, Not Secure

June 06, 2017 Added by:Alexandre Cagnoni

The Social Security Administration (SSA) recently instituted its latest precautions to identify threats and protect citizens’ information by making two-factor authentication mandatory for all users.

Comments  (0)

E54bce6ca0fef52e62d84b5ccedb4428

The Cyber Car: The Intimate Tango of the 21st Century

May 25, 2017 Added by:Asaf Atzmon

The automotive industry is now at a point of no return. Cyber is here to stay and the industry is very well aware of the vulnerability of connected cars.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »