Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

think ponder reflect
switchboard operators

sort filter folders organizing

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

submarine periscope 101722825

Chinese hackers stole 614GB of undersea warfare data from U.S. Navy contractor

Chinese hackers reportedly stole hundreds of gigabytes of undersea warfare data from a contractor which works for the U.S. Navy’s underwater weapons R&D center.

MyHeritage HQ

92 million MyHeritage email addresses found on private server

On Monday, MyHeritage, an online genealogy platform, announced that more than 90 million of their users had email addresses and hashed passwords compromised, after a researcher discovered a file being hosted on a private server.

signature signing contract handwriting cursive

Do those stellar security obligations really provide any protection?

It is vital for businesses to understand limitation-of-liability clauses in vendor contracts, especially when recovering damages from a cybersecurity breach. Here is insight into these clauses, including how businesses can best draft...

thinkstockphotos canada flag

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce’s Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers.

serious teenagers on smartphones 159021305

Thousands of kids’ Apple IDs stored in plaintext on unprotected server

Researcher discovered TeenSafe stored thousands of kids’ Apple IDs in plaintext on an unprotected AWS server. The server has since been taken down.

leaking binary data pouring through one's hands

Let’s get serious about security: 2.6 billion records stolen or compromised in 2017

Gemalto’s 2017 Breach Level Index found 2.6 billion records were compromised in 2017, as well a number of new data breach tactics. Breached or exposed data is not only a headache for security teams. It also impacts brand reputation,...

north korea flag games

Theft of North Korean secrets may have pushed Kim Jong Un into talks

The ultimate insider has made off with North Korea's cyber intelligence, counterintelligence and nuclear secrets, causing people to think that's why Kim Jong Un met with South Korea's leader.

sepia number 3 film reel top three

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding.

04 cyberlaws gavel

Georgia governor vetoes bill that would criminalize good-faith security research, permit vigilante action

Veto comes in response to overwhelming criticism from industry. Georgia cybersecurity folks had been outraged about SB 315, and warned that it could cost the state jobs.

cyber resilience shock absorber

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

thumbs up positive attitude congratulations happy employees staff

Branding infosec: Why security should consider its own internal advertising campaign

A positivity campaign raised security awareness — and improved performance — at Finning International.

draft eprivacy regulation   privacy by design

Data and privacy breach notification plans: What you need to know

Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that.

RSA conference 2017

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

Facebook Data Debacle - Android

Breaking down Facebook’s communications playbook

Lessons learned from Facebook’s response to its data privacy crisis, and how you can use them to protect your own reputation – even if you aren’t a tech giant.

customer feedback frustrated man speech bubbles social media

Customers describe the impact of the Allscripts ransomware attack

A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that’s hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and...

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

certified rubber stamp with red ink

Underwriting cyber exposure – the business case for certifying

The ability to have an independent and agnostic organization provide a certification of a product or service has more upside than down.

Load More