Software Integrity Blog

Archive for the 'Data Breach Security' Category

 

From video games to government: How to steer clear of social engineering scams

Prevent different types of social engineering attacks, targeting everyone from CEOs to gamers to smart appliance users, with the right training and tools.

Continue Reading...

Posted in Data Breach Security | Comments Off on From video games to government: How to steer clear of social engineering scams

 

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.

Continue Reading...

Posted in Data Breach Security, Security Standards and Compliance | Comments Off on Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

 

Biggest 2019 data breaches: Some of the worst of the worst

How do you evaluate the impact of a data breach? Here are six of the biggest data breaches in 2019 in terms of millions, even billions, of people affected.

Continue Reading...

Posted in Data Breach Security | Comments Off on Biggest 2019 data breaches: Some of the worst of the worst

 

Ask the Experts: What are the biggest cyber security threats for 2020?

What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.

Continue Reading...

Posted in Application Security, Data Breach Security | Comments Off on Ask the Experts: What are the biggest cyber security threats for 2020?

 

Patch now or pay later: Report

To prevent data breaches, practice these two fundamentals: shift left (perform application security testing early and often in your SDLC), and always patch.

Continue Reading...

Posted in Data Breach Security | Comments Off on Patch now or pay later: Report

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach Security, Healthcare Security & Privacy, Software Security Program | Comments Off on More medical mega-breaches thanks to third-party insecurity

 

The Verizon DBIR and the art of the breach

An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights.

Continue Reading...

Posted in Data Breach Security, Software Architecture & Design | Comments Off on The Verizon DBIR and the art of the breach

 

GDPR: Not heavy-handed yet, but driving data breaches into the open

The GDPR fines issued so far have been small, but breach notifications are up. As GDPR continues to ramp up, it seems likely to achieve its goals of privacy.

Continue Reading...

Posted in Data Breach Security, Software Compliance, Quality & Standards | Comments Off on GDPR: Not heavy-handed yet, but driving data breaches into the open

 

Advances in healthcare security since the Anthem data breach

The Anthem data breach in 2014–2015 was the largest healthcare data breach ever. But healthcare cyber security has improved since then.

Continue Reading...

Posted in Data Breach Security, Healthcare Security & Privacy | Comments Off on Advances in healthcare security since the Anthem data breach

 

Click2Gov breaches show the power of zero-days

Patching issues fast is a step toward software security. But as the Click2Gov breaches show, zero-day vulnerabilities resist even the most persistent patchers.

Continue Reading...

Posted in Data Breach Security | Comments Off on Click2Gov breaches show the power of zero-days