-
Aug10
Daily Security News from @trustpath - Aug 10, 2016
Daily Security news from @trustpath.
Cybercriminals hack Oracle’s payment systems in massive attack
There are now fears that these stolen credentials could be used to remotely compromise point-of-sale payment terminals within customer stores.
Newcomer Tigera enters the container game | #OpenStackSV
If you look at the highly publicized data breaches, one thing most of them have in common is that people have broken through a perimeter, said …
Record HIPAA Settlement Paid by Hospital Chain
… and Accountability Act (HIPAA), in connection with three 2013 data breaches that affected the protected health information of millions of its patients.
Why Healthcare Data Security, Compliance Issues Go Untreated
Security: Encrypted data sent through a secure channel prevents data breaches and protects sensitive information. Compliance: Visibility, control, and …
Michigan Credit Unions Join Lawsuit Over Wendy’s Data Breach
Ross said similar data breaches at Target and Home Depot stores in 2013 and 2014 cost Michigan credit unions nearly $4.5 million, including …
Data theft rises sharply, insiders to blame
A new survey exploring the main causes of corporate data breaches suggests that three out of four organizations in the US have been hit with the loss …
Organisations cannot afford to ignore the GDPR compliance challenge, says
Cambridge Network This comes in response to a report stating that the overall costs of cyber security incidents and data breaches are much higher than the financial …
Risk vs reward when good data becomes dangerous
The number of cyber-attacks and data breaches continues to grow worldwide and show no sign of slowing. As such, people need to question whether …
Terbium Labs Helps Organizations Reduce Data Theft and Fraud With Dark Web
Marketwired (press release) “We are pleased to work with IBM i2 to make greater use of security data, speed recovery and minimize loss caused by inevitable data breaches and …
Government Data Woes: 2016 Compromised Records Surpass Total for Last Three
Security Intelligence (blog) In fact, a midyear checkup showed that the health care industry continues to represent a growing percentage of all data breaches 15 percent in the …
Census disaster highlights power of print
The attack, emanating apparently from overseas, highlighted the serious concerns expressed by many Australians about online data breaches, which …
Credit Card Fraud Is Up 41% – Don’t Be the Next Victim!
The increase is due to an increased number of data breaches, as well as a surge in the overall popularity of electronic payments, according to a study …
Building A Detection Strategy With The Right Metrics
… traffic analytics, sandbox-based detection, user and entity behavior analytics, endpoint detection, malware analysis, and so on, with these questions:.
Health care system pays $5.5 million in data breach settlement
At least one of the data breaches it admitted to revealed valuable information about 4 million patients, including names, addresses, credit card …
FDIC Starts IT Assessment In Series of Data Security Efforts
FDIC introduced the measures after it submitted to Congress a retroactive report on five data breaches that have occurred at the agency since October …
Study: ‘Insider negligence’ most likely cause of data breaches
cause of a data breach, ZDNet reports. The study polled more than 3,000 …
Terbium Labs Helps Organizations Reduce Data Theft and Fraud With Dark Web
Marketwired (press release) Users of Matchlight can see breach detection go from days or months to just minutes. To showcase the complementary nature of the i2 and Matchlight …
Advanced Threat Hunting: Are You The Hunter Or The Hunted?
Make proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures. Security …
In-Q-Tel, Anomali Enter Agreement to Develop Threat Intelligence Platforms
Anomali designed its platforms to aggregate and curate threat intelligence data, address false-positives, facilitate threat hunting activities and provide …
Dota 2 Forum Hack: Valve Protected Passwords with Flawed MD5 Algorithm
… ended up on LeakedSource.com, a site meant to chronicle breaches and give easy access to users searching for their own stolen credentials.
Census 2016 danger in the era of big data
The ABS itself has had 14 data breaches since 2013. The Sony Corporation, the US Department of State and the director of the CIA have all been …
How a Reseller Grew More Profitable by Selling Managed Services
It was that uncompromising attitude that led the company to select Webroot SecureAnywhere Business Endpoint Protection as its preferred …
Logging Providers Are The Good Type Of Hackers
Besides having the catchiest tagline for an IT company – “You got 99 problems but logging ain’t one” – LogDNA is a cloud-based log management …
-
Read these next:
- Daily Mobile Computing News from @topmobilenews - Aug 10, 2016
- Daily Venture/Startup News from @topventurenews - Aug 10, 2016