Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

eliminate insider threats 1

Are you you?

Are insiders really threats or part of the solution?

data breach leak security binary code network

The cost of 2017 data breaches

With the average cost of data breaches rising – including per-record costs of each breach – it's high time most enterprises are going to have to get serious about changing their approach to infosec.

password security privacy hacker breach phishing

5 steps to enable you to stare back in the face of inevitable compromise

How to deal with the safe guess that your company has been breached.

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

dark web hacker tablet malware

Scan the dark web for threat intelligence

It may be possible to glean valuable security insights by monitoring the dark web.

hacked computer security symbol   hacked rot

Forever 21: Hackers breached payment system for 7 months

Forever 21 confirmed hackers breached its payment system for seven months and admitted encryption was turned off on some point-of-sale (POS) devices.

cybersecurity

More cybersecurity drama, but some hope for defenders in 2018

And this for the short descriptive sentence: From fileless malware attacks to attack attribution becoming more complex, 2018 won't offer less security drama. But there's still good reason for security professionals to be optimistic...

hacker login password cliche

Leaked 1.4 billion credentials a risk to users and business

A more nuanced conversation is required to understand the risks that this interactive database poses to organizations.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

predictions crystalball

Our top 7 cyber security predictions for 2018

Let’s face it: 2017 was a terrible year for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Will 2018 be better?

state of infosec 2018 intro

What’s in store for security in 2018?

2018 will be a crucial year in determining our strength against vicious hackers. Here’s a glimpse at what we can expect.

board ceo executives table

Why quantum computing is a board level security risk

The quantum threat is a board-level issue. Boards need to begin considering the quantum threat within their cybersecurity strategy and planning for it now.

Applied Materials, Inc.

4 Applied Materials executives fleece company and get indicted

U.S. Attorney for Northern California indicted four former executives for stealing intellectual property and trade secrets from Applied Materials.

hacked computer security symbol   hacked rot

Researchers' tool uncovers website breaches

UCSD researchers' Tripwire tool uncovered website breaches, yet none of the sites disclosed the breaches to customers after they were told of the hack.

01 intro prediction

8 cybersecurity trends to watch for 2018

New challenges and threats will face IT departments in the year ahead.

01 intro prediction

Cybersecurity trends for 2018

2017 was dominated by news of major hacks, cybersecurity threats and data breaches. What will 2018 have in store?

intro breaches getting someone fired

The buck stops here: 8 security breaches that got someone fired

Some deserved the blame, and some seemed to just be at the wrong place at the wrong time.

padlock with circuitry lock in secure

The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks

The Sheltered Harbor cybersecurity initiative for U.S. banks and financial services firms protects against hacker attacks.

thinkstockphotos 499123970 laptop security

5 computer security facts that surprise most people

As a 30-year road warrior, I’ve learned some security truths that seem wrong, but must be accepted if you really want to understand the threats you face.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Load More