Data Breach

Data Breach | News, how-tos, features, reviews, and videos

04 cyberlaws gavel

Georgia governor vetoes bill that would criminalize good-faith security research, permit vigilante action

Veto comes in response to overwhelming criticism from industry. Georgia cybersecurity folks had been outraged about SB 315, and warned that it could cost the state jobs.

cyber resilience shock absorber

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

thumbs up positive attitude congratulations happy employees staff

Branding infosec: Why security should consider its own internal advertising campaign

A positivity campaign raised security awareness — and improved performance — at Finning International.

draft eprivacy regulation   privacy by design

Data and privacy breach notification plans: What you need to know

Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that.

RSA conference 2017

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

Facebook Data Debacle - Android

Breaking down Facebook’s communications playbook

Lessons learned from Facebook’s response to its data privacy crisis, and how you can use them to protect your own reputation – even if you aren’t a tech giant.

customer feedback frustrated man speech bubbles social media

Customers describe the impact of the Allscripts ransomware attack

A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that’s hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and...

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

certified rubber stamp with red ink

Underwriting cyber exposure – the business case for certifying

The ability to have an independent and agnostic organization provide a certification of a product or service has more upside than down.

Adobe logo and products reflected in displays.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

cyber attack

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.

ransomware breach hackers dark web

Ransomware incidents double, threatening companies of all sizes

Ransomware is the most common malware used when it comes to breaches, according to Verizon’s 2018 Data Breach Investigations Report.

data breach thinkstock

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

medical heart rate monitor ekg hospital

Paper healthcare records highly vulnerable, yet often overlooked

It isn't just digital healthcare records that are vulnerable. Paper records are regularly compromised -- and they're the easiest for healthcare organizations to protect.

CSO slideshow - Insider Security Breaches - Weak link breaks among a larger chain in a network

What happens when half the nation's information gets stolen?

The Equifax data breach exposed personal account data for nearly half of all adult Americans. Now that it’s in the hands of criminals, we need to reconsider traditional approaches to financial identity verification.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

panera bread

Panera Bread blew off breach report for 8 months, leaked millions of customer records

As many as 37 million customer records were exposed thanks to a security vulnerability that Panera Bread chose to ignore for eight months.

a hooded figure targets a coding vulnerability

Saks, Lord & Taylor hacked; 5 million payment cards compromised

Hackers managed to lurk on the network of Saks Fifth Avenue, Saks Off 5th, and Lord & Taylor for nearly a year and steal the payment card data of 5 million customers.

fragile binary cyberattack risk vulnerable

4 main reasons why SMEs and SMBs fail after a major cyberattack

The challenges SMEs and SMBs face and what to do about them.

istock 916151214

Iran's need to steal intellectual property

The indictment of nine Iranians by the DOJ is one in a long string of incursions by Iran to compromise trusted insiders and steal intellectual property.

Load More