Data Breach

Data Breach | News, how-tos, features, reviews, and videos

cso security hacker breach shadowy figure with briefcase by jordidelgado getty images 2400x1600px
human weak link cybersecurity primary

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

A network of linked question marks.

6 board of directors security concerns every CISO should be prepared to address

The COVID pandemic and spike in cybercriminal activity has raised interest in security among corporate boards. These are the concerns and questions CISOs say they are now hearing from them.

cso security hack breach water leak gettyimages 466029458 by firmafotografen 2400x1600px

The road to a data breach is paved with good intentions

Australian travel agent’s woes are a reminder that privacy policies don’t automatically let you share customer data, even for well-intentioned efforts.

cyber attack alert / data breach

FireEye breach explained: How worried should you be?

The theft of red team tools, allegedly by Russia's Cozy Bear group, poses only a small threat to other organizations. The real lesson: Anyone can be hacked.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

forensics threat hunter cyber security thumbprint

Tips to prep for digital forensics on Windows networks

Know what data you need to collect and how you will collect it before a security incident occurs on your Windows network.

frustrated defeated discouraged upset mistake failure karina carvalho 87593 unsplash

University of Tasmania breach a tough lesson in cloud misconfiguration errors

Human error back in the spotlight after Office 365 permissions lapse.

digital identity / authentication

People key as updated Australian cyber strategy targets ‘existential threats’

In the era of COVID-19 work-at-home, fostering individual responsibility over security is as important as government capabilities and industry collaboration.

Digitization of United States currency  >   Digital transactions

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

An australian iconic road sign with kangaroo showing a long road with bright blue sky

Threat intelligence puts on an Australian accent

Details of local breaches are being collated to inform a better cybersecurity response.

CCTV security cameras gather data during traffic surveillance.

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?

data breach predictions

Australian government faces epidemic of breaches

Despite improvements, agencies are still struggling to lock down security practices — and a string of breaches highlights the consequences.

Australia  >  National flag

How the Australian government is helping you fight data breaches

To help battle hackers, it has developed the Notifiable Data Breaches (NDB) scheme, is revising its cyber security strategy, and funding security education in universities.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

silver platter passwords exposed authentication hacked vulnerable security breach

Austal breach analysis a reminder that Australia can do better on credentials

As cyber criminals capitalise on COVID-19 chaos, CSOs should take time to improve credential hygiene.

A man with an umbrella stands waist-deep in water as rain continues to fall.

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.)

Abstract trend lines graphing change and transformation.

Top cybersecurity facts, figures and statistics

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

Load More
You Might Also Like