Data Breach

Data Breach | News, how-tos, features, reviews, and videos

Exclamation point on screen warning alert caution stop
security breach egg reveal locks binary code hacked

cockroach bug binary2

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

vulnerable virus breach hacked cyber attack

Reddit discloses hack, says SMS intercept allowed attackers to skirt 2FA protections

Reddit, one of the largest websites on the internet, announced on Wednesday that someone was able to compromise staff accounts at their cloud and source code hosting providers, leaving backups, source code, and various logs exposed.

cloud security data breach crime accessible

Unsecured server exposes 157 GB of highly sensitive data from Tesla, Toyota and more

A publicly accessible server belonging to Level One Robotics and Controls exposed 157 GB of highly sensitive data from hundreds of companies, including Tesla, Toyota and Ford.

face superimposed on keyboard privacy hacker

Is privacy even possible in this Golden Age of Data Breaches?

Privacy seems like a pipe dream when everyone’s data seems vulnerable. Do we just give up on it though?

mobile security / unlocked data connections

8 steps to secure unmanaged devices in the enterprise

As more and more exploitable endpoints find their way onto our networks we need to act to secure them. This article will highlight practical strategies to help you secure IoT, mobile and other devices that require attention.

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

3 blockchain

5 ways to hack blockchain in the enterprise

Experts warn of blockchain security risks in non-cryptocurrency use cases.

red padlock cybersecurity threat ransomeware

10 ways to prevent, detect and recover from ransomware and zeroday threats

As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Duty of care: Why (and how) law firms should up their security game

Lawyers have been slow to adopt modern technology — and even slower to respond to security threats. That may be changing.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

patreon logo

No data breach at Patreon, but proactive notice caused some concern

Patreon, the membership platform that helps creators get paid for their work, sent users a letter on Monday warning them about a data breach at Typeform. But the proactive letter caused some panic, as more than a few people took it to...

reality winner nsa contractor

Reality Winner pleads guilty to revealing NSA secrets

Reality Winner, who was charged with giving a classified NSA report to the Intercept, pled guilty to sharing National Defense information.

whyhpcmatters frauddetection 1000

3 things your marketing department can teach your CNP fraud prevention team

You may be surprised to learn that your marketing department can teach your fraud prevention team a lot about card not present fraud. Not only are the two departments working in tandem to reach the same goals, but the marketing...

think ponder reflect

Cybersecurity – how confident (complacent?) are you?

Cybersecurity must be a process of continual evolution: just because you feel protected today doesn’t mean you will be tomorrow.

switchboard operators

Rose-colored glasses and sepia-tinted memories

We view history through a rose-colored tint. People often leave out the historical context of events and why they occur. Understanding the evolution of systems and their context allows us to better comprehend past decisions and keep...

sort filter folders organizing

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

submarine periscope 101722825

Chinese hackers stole 614GB of undersea warfare data from U.S. Navy contractor

Chinese hackers reportedly stole hundreds of gigabytes of undersea warfare data from a contractor which works for the U.S. Navy’s underwater weapons R&D center.

Load More