-
Sep01
Daily Security News from @trustpath - Sep 1, 2016
Daily Security news from @trustpath.
What to look for in endpoint detection and response tools and services
Organizations are quickly learning that keeping the bad guys out of an enterprise environment isn’t as simple as deploying firewalls and antivirus.
Breaches showing patterns of both desirable, questionable characteristics
This year’s annual Verizon Data Breach Investigations Report showed 63 percent of all breaches included the use of stolen credentials, up from 51 …
Mandatory breach notification laws is your data ready?
If or rather when the bill passes, Australian businesses will be required to report serious data breaches to those affected individuals and the Office …
OAIC accepts undertaking from ARC on Optus customer data breach
… has historically taken a hard line against companies that cover up data breaches, saying that the concealment of a data breach “will not be looked …
Cyber security incidents almost double in one year
The request revealed that most data breaches affected the health, local government and education sectors, with these accounting for 64 percent of …
How Older Cybersecurity Lapses Can Give Birth to Future Data Breaches
Since my last post on the subject (LinkedIn Grapples with the Ripples of a 2012 Data Breach), there have been several developments related to …
What can we learn from the Sage data breach?
… actually the most common reason for cyber-attacks and data breaches, with studies showing it’s responsible for as many as 95 per cent of incidents.
Leading VMS Provider to Showcase Safe City GSOC at ASIS International
PR Web (press release) Lead by Vidsys, the leading global software technology manufacturer of Physical Security Information Management (PSIM) and Converged Security …
Healthcare and local gov are most likely UK bodies to suffer infosec
The Register The number of security incidents reported to UK data privacy watchdogs nearly doubled in the past year, with organisations increasingly becoming …
Spotify is making users change their passwords because other companies keep
Business Insider There have been numerous huge data breaches in the news recently, often dating from years ago, and affecting tens of millions of users including …
Dropbox Acknowledges 68 Million User Passwords Were Leaked In 2012 Data
Tom’s Hardware It’s likely that the company didn’t know the true extent of the hack, as sometimes data breaches happen without leaving much of a trail behind.
OneLogin confirms bug which allows access to Secure Notes
Ross Brewer, vice president and managing director of EMEA, LogRhythm told SCMagazineUK.com: Data breaches, both old and new, are continuing …
Access Management Key to Info Security
Citing stats from a Verizon breach report indicating nearly two-thirds (63 percent) of confirmed data breaches involve weak, default or stolen …
Lost or stolen devices account for one-quarter of breaches in US financial
Canadian Underwriter The problem with data breaches, according to Bitglass, is that the financial sector struggles with data leakage in part because many such …
Spotify resets user passwords due to data breachs suffered by other
SC Magazine UK Spotify will pre-empt any potential security mishaps by resetting users passwords, in response to a recent rash of data breaches affecting Dropbox, …
Hack Brief: 4-Year-Old Dropbox Hack Exposed 68 Million People’s Data
For hackers, years-old leaks of millions of people’s private credentials don’t expire. Instead, they become a kind of collector’s item. Since people so …
Raising the Stakes: New Developments in Canadian Privacy Torts
Over the past decade, some of the world’s largest corporations have suffered data breaches or other lapses in data management. While the potential …
CrowdStrike Falcon Platform Achieves Independent Validation for PCI DSS
Yahoo Finance In contrast, Coalfire has determined that CrowdStrike Falcon with its powerful unified combination of next-generation antivirus and endpoint detection …
Last.fm breach from 2012 affected 43 million users
That’s according to LeakedSource, a repository for data breaches that obtained a copy of the stolen data. Included in the trove are users’ names, email …
Official Named to Election Cybersecurity Panel Oversaw Breach of Millions
The Intercept As the person responsible for one of the worst voter data breaches in history, shouldn’t Kemp be taking cybersecurity classes instead? the group …
Why Choosing the Right Endpoint Protection Can Make or Break Your Business
Today’s information security landscape might leave a lot of CSOs and CISOs second-guessing their career choice. Never before have organizations …
What you need to know about your risk
In addition to potential data breaches, another example of an exposure is email liability. Companies can be exposed to liability for allegations that …
-
Read these next:
- Daily Mobile Computing News from @topmobilenews - Sep 1, 2016
- Daily Venture/Startup News from @topventurenews - Sep 1, 2016