Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

security threat - circuit board-hand knocking over a chess piece
supply chain management logistics - ERP - Enterprise Resource Planning

abstract data stream

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

hacker hack attacke cyber malware keyboard

Maslow’s hierarchy of needs for incident response

The advent of laterally spreading malware requires the security community to progressively build out incident response to include more thorough scoping to determine the true extent of an event and threat hunting to find those threats...

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.

7 data driven

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

rules procedures guidelines process structure

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

man in shadow breach cyber attack ceo

SEC guidance on IT security: Would you report security risks before a breach?

When organizations can collaborate to prevent data breaches from happening, we can create real security rather than spread fear.

medical heart rate monitor ekg hospital

Nuance says NotPetya attack led to $92 million in lost revenue

Nuance Communications, a software company that offers speech and imaging technology to a number of markets, including healthcare and finance, said the 2017 NotPetya malware attacks caused the company to lose $92 million in revenue,...

ep 20 salted hash

Salted Hash Ep 20: GDPR: Looming deadlines, massive penalties

The May 25 deadline for the General Data Protection Regulation (GDPR) is quickly approaching. Organizations large and small are scrambling to align with these new requirements, but the task isn't an easy one. In fact, the idea of...

laptop security breach password identity theft hacker
By

2,844 new data breaches added to Have I Been Pwned

The massive breach, which includes more than 80 million records, is listed as a single 'unverified' data breach, but it is ranked as the 15th biggest breach on Have I Been Pwned.

cyberwarfare defense illustration

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

A decentralized approach will allow users to take back ownership of their personal information, while protecting them from major breaches.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

11 victims

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough

What’s on CISOs Minds in 2018?

Business risk, the cyber supply chain, attackers, data security and awareness training top the list

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

Load More