-
Apr12
Daily Security News from @trustpath - Apr 12, 2017
Daily Security news from @trustpath.
Spy toys: A look at the dangers of data breaches in toys
With so many toys connected to the internet it’s no wonder hackers are targeting toys. Now that Spiral Toys has been involved in a data breach, Jade … more.
Endpoint Detection and Response Solutions Reviews
Community presented by Gartner Peer Insights. more.
Data Sheds Light on MSP’s Favorite Vendors
Among companies that made last year’s MSPmentor 501 list of top managed service providers, Webroot was the preferred endpoint protection … more.
Share prices ‘suffer 1.8% drop following data breaches’, says report
Now an analysis of new data claims to show that investors and analysts are starting to ‘price in’ data breaches when valuing companies. more.
Connecting previous Endpoint clients to new Sophos UTM install
issues. I have a heap of Windows clients with the Sophos Endpoint virus … more.
Telecommuting Healthcare Employees Get Employers in HIPAA Compliance Hot
Lexology (registration) Covered entities are required to self-report data breaches to the Office for Civil Rights (OCR), the agency charged with enforcing the HIPAA Privacy … more.
Tax Identity Theft Surges On Data Breaches
Tax day is just a week away, but as you hurry to get your return in, experts say you must also take more care than ever to protect your identity. You’ve … more.
Crunch time for Yahoo as EU prepares to release statement on data breaches
The Irish data protection authority (DPA) is preparing to release the findings of an investigation into the data breaches that occurred at Yahoo, … more.
Cybersecurity Attacks Hit 87% of Organizations in 2016
Healthcare cybersecurity attacks are also on the rise, with PHI data breaches continuing to affect organizations of all sizes. A Redspin report released … more.
Yahoo’s EU Watchdog set to show teeth as privacy probe wraps up
Inc. is set to be ordered to make changes as its chief privacy regulator in Europe wraps up a probe into one of the biggest data breaches in history. more.
Data breaches strip tens of millions off UK firms’ market value, study
ComputerWeekly.com A good example of the effects of data breaches on company value is Yahoo, which was forced to discount by $350m the sale price of its core business … more.
SentinelOne Appoints Seasoned Sales Executive to Lead Worldwide Channels
Yahoo Finance PALO ALTO, CA–(Marketwired - Apr 12, 2017) - SentinelOne, the company transforming endpoint protection by delivering unified, multi-layer … more.
A credible threat: cyber attacks and stolen credentials
63% of all breaches involved the use of stolen credentials, which is a huge element that cannot be stopped by network or endpoint security. more.
Targeting the Weak Link in the Supply Chain: Amazon Third-Party Sellers
eSecurity Planet … method of authentication to verify the user’s identity for a login or other transaction, in order to stop the use of stolen credentials,” Williams added. more.
What Happens To Your Information After A Data Breach?
Data breaches have become all-too-common amongst retailers, businesses, educational institutions and health care facilities. Last year, 1,093 data … more.
Automation is the key to better enterprise security
People are no longer surprised by data breaches. Many breaches are perpetrated by malicious actors. Others are the result of lapses in internal … more.
10 of the biggest healthcare data breaches announced in Q1
As of March 14, there have been 312 reported data breaches and more than 1.3 million exposed records in 2017, according to the Identity Theft … more.
The growing difficulty of protecting data on the move
There is also the link between data breaches themselves and terrorism. Often, cyber security breaches in particular but also data breaches involving … more.
A Look at Facebook’s Interactive Neural Network Visualization System
… there are other problems with this lack of insight into network behavior, particularly in terms of optimizing models for better performance, efficiency, … more.
In Cyberspace, It’s Always Hunting Season
The confluence of cyber defense and offense has given rise to the practice of threat hunting: aggressively seeking adversaries rather than waiting to … more.
5 lessons to avoid credential theft
Nearly every breach uses stolen credentials. According the 2016 Verizon Data Breach Incident Report, 63 per cent of breaches have used stolen … more.
-
Read these next:
- Daily IoT/Blockchain News from @surgethings - Apr 12, 2017
- Daily Cloud Computing News from @cloudfeednet - Apr 11, 2017