How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach.
Prevent different types of social engineering attacks, targeting everyone from CEOs to gamers to smart appliance users, with the right training and tools.
Posted in Data Breach Security | Comments Off on From video games to government: How to steer clear of social engineering scams
The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.
How do you evaluate the impact of a data breach? Here are six of the biggest data breaches in 2019 in terms of millions, even billions, of people affected.
Posted in Data Breach Security | Comments Off on Biggest 2019 data breaches: Some of the worst of the worst
What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.
To prevent data breaches, practice these two fundamentals: shift left (perform application security testing early and often in your SDLC), and always patch.
Posted in Data Breach Security | Comments Off on Patch now or pay later: Report
The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.
An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights.
The GDPR fines issued so far have been small, but breach notifications are up. As GDPR continues to ramp up, it seems likely to achieve its goals of privacy.
The Anthem data breach in 2014–2015 was the largest healthcare data breach ever. But healthcare cyber security has improved since then.