Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

ipad at the beach
Cloud Security

storm clouds dark

Developer hangs patient data out in a cloud—for two years

In 2015, a developer at UIHC inadvertently put the personal data of about 5,300 patients in an open store in the cloud. UIHC found out about it in 2017.

10 fbi

Ghosts in the machine

On May 19, 1996, Leslie Isben Rogge become the first person on the 10 Most Wanted List to be apprehended due to the Internet. The FBI hasn’t been the same since.

23922465470 fe3c8b8cdf o

The 15 biggest data breaches of the 21st century

Security practitioners weigh in on the 15 worst data breaches in recent memory.

00 title awareness training

4 tips to make use of Wannacry in awareness programs

When security events make news, you can take advantage of the wake-up call — if you know what to do.

dark web hacker tablet malware

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

csan 001 top 15 security breaches
video

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees.

data breach predictions

Chances are good ... that you’re already infected

Businesses in certain industries need to accept the fact that they are high-priority targets...and may have already been breached.

cyberwarfare defense illustration

Petya: Is it ransomware or cyberwarfare?

It turns out Petya isn't ransomware, but a cyber weapon being used to carry out cyberwarfare activities.

1 incident response police tape crime death

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

problem solution blackboard

Cybersecurity has a huge skills gap! Will you be part of the problem or the solution?

There is currently a projected shortfall of 1.6 million qualified persons to fill cyber security roles. Since it is very clear we are vulnerable to cyber attacks and need to mitigate them we need people now. Complaining about...

Bank vault

PII of 1 million compromised in Washington State University safe heist

WSU backed up their data for their Social & Economic Sciences Research Center (SESRC) and locked the hard drive in a safe. The safe was stolen and now the PII of 1million individuals has been compromised.

linux penguin security

5 things you need to know about Stack Clash to secure your shared Linux environment

Qualys shows that attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

Hacking stealing password data

Two years after the OPM data breach: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

Election 2016 teaser - Republican vs Democrat

Republican data analytics firm exposes voting records on 198 million Americans

Researcher Chris Vickery has discovered nearly 200 million voter records in an unsecured Amazon S3 bucket maintained by Deep Root Analytics (DRA), a big data analytics firm that helps advertisers identify audiences for political ads....

hacked hacker breach security

Risk aware IAM for an insecure world

In a world full of uncertainties and data breaches, IDaaS providers must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction.

Healthcare: Are you prepared to trade privacy for treatment?

The U.S. HHS Health Care Industry Cybersecurity Task Force and the U.K.'s ICO in separate reports highlight the need to better protect patients' information.

machine learning ai artificial intelligence

FireEye 2.0: Cyberhumans as a Service

FireEye CEO Kevin Mandia discusses the company's approach to cyber crime and cybersecurity.

cybersecurity shield and gear image

Cisco and IBM announce historic cybersecurity partnership

Cisco Security and IBM Security join forces to battle cybercrime, helping customers reduce the time to detect and mitigate threats.

Load More