Advertisement
Top

Tag: Breaches


Data loss, Threats & Malware

Many firms aren’t reporting breaches to the proper authorities

September 26, 2023

Via: TechRadar

A concerning amount of companies are pretty woeful in reporting the cyberattacks and breaches they suffer, both internally and externally. Research conducted by Keeper Security found that nearly half (48%) of the IT and security leaders it surveyed that have […]


Network security, Security

Navigating Legacy Infrastructure: A CISO’s Actionable Strategy for Success

August 25, 2023

Via: The Hacker News

Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often under various leadership teams with different priorities and goals. As […]


Application security, Security

Attackers exploit APIs faster than ever before

March 8, 2023

Via: Help Net Security

After combing through 350,000 reports to find 650 API-specific vulnerabilities from 337 different vendors and tracking 115 published exploits impacting these vulnerabilities, the results clearly illustrate that the API threat landscape is becoming more dangerous, according to Wallarm. Researchers came […]


Cloud security, Security

Ermetic extends its CNAPP with cloud workload protection capabilities

January 27, 2023

Via: Help Net Security

Ermetic has extended its Cloud Native Application Protection Platform (CNAPP) with cloud workload protection capabilities that enable customers to detect, prevent and remediate security risks in virtual machines, containers and serverless functions. Using context that spans infrastructure configurations, network, access […]


Threats & Malware, Vulnerabilities

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

Via: Threat Post

Compromised credentials and identities, third-party breaches, API attacks, and application exploits are all foundational entry points for today’s hackers. Recent months have brought many high-profile breaches from Samsung and Nvidia to Okta and the continued aftermath of Log4j. Still, ultimately, […]


Network security, Security

The Elusive Goal of Network Security

March 25, 2022

Via: Security Week

You may have heard there was a recent breach at a major cell phone provider, exposing the personal information of about 40 million people. And what was the public response to this outrage? They yawned. That hack was just one […]


Privacy protection, Security

Stop the breaches! Four steps to minimize security risks

August 13, 2021

Via: Help Net Security

Ransomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. C-suite executives must show leadership in driving a security culture to ensure that their company can […]


Data loss, Threats & Malware

While IT budget allocations for cybersecurity are significant, data breaches still very common

August 12, 2021

Via: Help Net Security

While IT security decision makers often consider cyberattacks a serious concern and are allocating a significant share of their IT budget to address their cybersecurity challenges, data breaches have still been uncomfortably commonplace, an INTRUSION survey reveals. Cybersecurity IT budget […]


Data loss, Threats & Malware

Trending cybercrimes and the big impact of lesser-known breaches

July 28, 2021

Via: Help Net Security

Sontiq released the Mid-Year 2021 Cybercrime Report, which highlights five key trends and the 2021 data breaches that pose the highest level of risk to victims. Companies are largely unprepared to fend off cyberattacks The report’s insights were derived from […]


Editorial

Cybercrime in 2021-Top 5 Cyber Attacks Witnessed so Far

April 30, 2021

Via: Natalie Dunn

With cybercrime on the rise, thousands of cyber attacks and data breaches are recorded each day. The phenomenon is surely not showing any signs of slowing down, with several big cyber attacks making the headlines so far this year. In […]


Threats & Malware, Vulnerabilities

99% of Websites at Risk of Attack Via JavaScript Plug-ins

July 14, 2020

Via: Dark Reading

Third-party programs such as Google Analytics and other plug-ins expose websites to Magecart, formjacking, cross-site scripting, and credit-card skimming, and other attacks, new research shows. A report released today by Tala Security found that these kind of attacks exploit vulnerable […]


Editorial

Protecting Your Cloud Environment Against Potential Threats

June 29, 2020

Via: Lawrence Malone

Almost every U.S enterprise today uses the cloud in some way or fashion, and with good reason—it saves money spent on hardware, gives you all the performance you need, and the high availability of the cloud provides the peace of […]


Threats & Malware, Vulnerabilities

How Security Leaders at Starbucks and Microsoft Prepare for Breaches

March 3, 2020

Via: Dark Reading

In today’s increasingly crowded threat landscape, it can be difficult to determine which threats companies should prioritize. For those who are stuck, it’s helpful to consider what major organizations are worried about and the steps they’re taking to combat those […]


Cloud security, Security

Posture management: Cloud security tools rise in wake of breaches

February 28, 2020

Via: CIO

High-profile breaches have sparked interest in an emerging class of security software. The technology, named cloud security posture management (CSPM), scours cloud environments and alerts staff to configuration issues and compliance risks, most of which stem from human error. Exhibit […]


Network security, Security

Cybersecurity in 2020: From secure code to defense in depth

February 10, 2020

Via: CSO Online

Since 2014, CIOs have flagged cybersecurity as either their first or second most important IT management issue in the venerable IT Trends Study from the Society for Information Management. Yet in 2013, cybersecurity came in just seventh in that same […]


Network security, Security

As US Congress Delays on Privacy, California Law in Focus

December 23, 2019

Via: Security Week

The statute becomes effective January 1, covering most entities doing business in California, just months after enforcement began for Europe’s General Data Protection Regulation, which affects many US online operations. The new law stems from a widespread effort to rein […]


Network security, Security

What Have We Learned About Data Protection After Another Year of Breaches?

February 13, 2019

Via: Security Intelligence

When the General Data Protection Regulation (GDPR) took effect last May, companies were seeking guidance and best practices to address their compliance challenges. Although this sense of urgency is beginning to diminish, the demand for data privacy controls will only […]


Hacker, Phishing

How End-User Devices Get Hacked: 8 Easy Ways

June 12, 2017

Via: Dark Reading

Security experts share the simplest and most effective methods bad guys employ to break into end-user devices. Phishing “Phishing is still the easiest way to compromise a user,” says Ragan. Spear phishing hits specific users with a malicious attachment; for […]


Application security, Vulnerabilities

AppSec teams facing resourcing issues that are making them vulnerable

February 3, 2017

Via: Help Net Security

A new Bugcrowd study of one hundred CISOs revealed that 94 percent are concerned about breaches in their publicly facing assets in the next 12 months, particularly within their applications. As more applications become publicly accessible, more breaches are occurring […]


Data loss

44% Of Companies Miss Breach Reporting Deadlines

December 21, 2016

Via: Dark Reading

A survey of IT professionals by Hungarian security firm Balabit on the current status of their security investigations has revealed that though 75% of organizations set deadlines for probing and reporting breaches, 44% could not meet them last year – […]