Software Integrity Blog

Archive for the 'Data Breach Security' Category

 

The shift to remote work makes red team testing more important than ever

Closing your office cuts off several attack vectors—but remote working creates thousands more. Here’s why a red team assessment is so essential right now.

Continue Reading...

Posted in Data Breach Security

 

Ask the Experts: How can we help organizations report data breaches?

A recent report recommends a national cyber incident reporting law. But how do we help organizations report data breaches if they fear regulatory sanctions?

Continue Reading...

Posted in Data Breach Security

 

Want to comply with privacy laws? Start with security

How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach.

Continue Reading...

Posted in Data Breach Security, Software Compliance, Quality & Standards, Software Security Program

 

From video games to government: How to steer clear of social engineering scams

Prevent different types of social engineering attacks, targeting everyone from CEOs to gamers to smart appliance users, with the right training and tools.

Continue Reading...

Posted in Data Breach Security

 

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.

Continue Reading...

Posted in Data Breach Security, Security Standards and Compliance

 

Biggest 2019 data breaches: Some of the worst of the worst

How do you evaluate the impact of a data breach? Here are six of the biggest data breaches in 2019 in terms of millions, even billions, of people affected.

Continue Reading...

Posted in Data Breach Security

 

Ask the Experts: What are the biggest cyber security threats for 2020?

What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.

Continue Reading...

Posted in Application Security, Data Breach Security

 

Patch now or pay later: Report

To prevent data breaches, practice these two fundamentals: shift left (perform application security testing early and often in your SDLC), and always patch.

Continue Reading...

Posted in Data Breach Security

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach Security, Healthcare Security & Privacy, Software Security Program

 

The Verizon DBIR and the art of the breach

An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights.

Continue Reading...

Posted in Data Breach Security, Software Architecture & Design