GDPR Is Coming Soon … and Companies Aren’t Ready

When the European Union’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018, it will affect global companies in a significant way. The initiative establishes specific requirements for how organizations must handle personal data touching E.U. citizens—even businesses that aren’t physically located in Europe. Read/see the slideshow explaining why businesses are still not […]

Insider Threats: Red Flags and Best Practices

Many businesses are finding the source of their greatest concerns are trusted employees with whom they interact every day. The insider threat is growing, with more than half (53%) of organizations confirming insider attacks in the past 12 months and 27% stating they have become more frequent, according to a new study. Read/see the slideshow explain […]

10 Social Engineering Attacks Your End Users Need to Know About

It’s the middle of National Cybersecurity Awareness Month: the perfect time to look beyond the obvious stolen passwords, phishing and malware, and into some of the social engineering attacks less known to the average end user. Read/see the slideshow explaining the ten social engineering attacks every one should know about on Dark Reading.

10 Major Cloud Storage Security Slip-Ups (So Far) this Year

One of many concerning security trends from 2017 is the accidental exposure of cloud data via misconfigured Simple Storage Service (S3) buckets from Amazon Web Services. This year has been marked with several data leaks from major organizations, most recently Accenture. Read/see the slideshow explaining the 10 major cloud storage security slip-ups in 2017 on […]

The 10 biggest data breaches

Equifax’s data breach may be the most serious data breach, given that it covered 143 million consumers and involved reams of confidential information, but it wasn’t the largest. Following are the biggest to date. Read/see the slideshow explaining the top 10 biggest data breaches of all times on American Banker.

7 Things to Know About Today’s DDoS Attacks

Distributed denial-of-service (DDoS) attacks continue to be a weapon of choice among threat actors seeking to extort money from victims, disrupt operations, conceal data-exfiltration activities, further hacktivist causes, or even to carry out cyberwar. Read/see the slideshow explaining different types of DDoS attacks on Dark Reading.

7 Takeaways From The Equifax Data Breach

The exposure of PII belonging to 143 million US consumers raises questions about the continued use of SSNs as identifiers, breach liability and app sec spending. Read Jai Vijayan list seven lessons we can take away from the Equifax Data Breach in a slideshow on Dark Reading.

7 Things to Know About Today’s DDoS Attacks

Distributed denial-of-service (DDoS) attacks continue to be a weapon of choice among threat actors seeking to extort money from victims, disrupt operations, conceal data-exfiltration activities, further hacktivist causes, or even to carry out cyberwar. Read/see the slideshow explaining seven things companies should know about DDoS attacks on Dark Reading.

The current state of cybercrime

CSO’s 2017 U.S. State of Cybercrime report reveals what IT and security pros fear, how they protect their data, what worked, and what they spend on cyber security. Read/see the slide show explaining CSO’s 2017 U.S. State of Cybercrime report on CSO Online.

The 10 sneakiest hacker attacks

Malware capable of sneaking past your defenses is the Holy Grail of the criminal world. Know your enemy. Here are the 10 sneakiest ways hackers breach your stronghold. Read/see the slideshow explaining the 10 sneakiest hacker attacks ever on CSO Online.