When the European Union’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018, it will affect global companies in a significant way. The initiative establishes specific requirements for how organizations must handle personal data touching E.U. citizens—even businesses that aren’t physically located in Europe. Read/see the slideshow explaining why businesses are still not […]
Many businesses are finding the source of their greatest concerns are trusted employees with whom they interact every day. The insider threat is growing, with more than half (53%) of organizations confirming insider attacks in the past 12 months and 27% stating they have become more frequent, according to a new study. Read/see the slideshow explain […]
One of many concerning security trends from 2017 is the accidental exposure of cloud data via misconfigured Simple Storage Service (S3) buckets from Amazon Web Services. This year has been marked with several data leaks from major organizations, most recently Accenture. Read/see the slideshow explaining the 10 major cloud storage security slip-ups in 2017 on […]
Equifax’s data breach may be the most serious data breach, given that it covered 143 million consumers and involved reams of confidential information, but it wasn’t the largest. Following are the biggest to date. Read/see the slideshow explaining the top 10 biggest data breaches of all times on American Banker.
Distributed denial-of-service (DDoS) attacks continue to be a weapon of choice among threat actors seeking to extort money from victims, disrupt operations, conceal data-exfiltration activities, further hacktivist causes, or even to carry out cyberwar. Read/see the slideshow explaining different types of DDoS attacks on Dark Reading.
The exposure of PII belonging to 143 million US consumers raises questions about the continued use of SSNs as identifiers, breach liability and app sec spending. Read Jai Vijayan list seven lessons we can take away from the Equifax Data Breach in a slideshow on Dark Reading.
Distributed denial-of-service (DDoS) attacks continue to be a weapon of choice among threat actors seeking to extort money from victims, disrupt operations, conceal data-exfiltration activities, further hacktivist causes, or even to carry out cyberwar. Read/see the slideshow explaining seven things companies should know about DDoS attacks on Dark Reading.
CSO’s 2017 U.S. State of Cybercrime report reveals what IT and security pros fear, how they protect their data, what worked, and what they spend on cyber security. Read/see the slide show explaining CSO’s 2017 U.S. State of Cybercrime report on CSO Online.
Malware capable of sneaking past your defenses is the Holy Grail of the criminal world. Know your enemy. Here are the 10 sneakiest ways hackers breach your stronghold. Read/see the slideshow explaining the 10 sneakiest hacker attacks ever on CSO Online.