Many organizations are moving too slowly towards addressing the human risk elements of security. At the heart of this lies a misunderstanding of human risk factors - with many believing the only contributors are Knowledge & understanding (85%) and Security behaviors (15%).
Recent CybSafe analysis suggests there are...
An ex-employee of Microsoft's Nuance Communications unit is at the center of a 2023 data breach that affected more than 1 million patients of Pennsylvania-based healthcare system Geisinger. The Department of Justice has criminally charged the former Nuance worker in the incident.
A Singapore court has sentenced a former employee of NCS Group to two years and eight months in prison for accessing the company's software test environment and wiping 180 virtual servers months after his employment ended. The company detected the unauthorized access after he deleted the servers.
It's not just the critical cybersecurity vulnerabilities; it's the speed at which adversaries are attacking them. This is one of the key findings of Fortinet's new FortiGuard Labs Global Threat Landscape Report. Fortinet's Derek Manky shares takeaways and analysis.
Erika Voss, vice president of information security at DAT Freight & Analytics, discusses the evolving landscape of cybersecurity investment, the critical areas often overlooked by enterprises - including insider threats, and the importance of building a cybersecurity culture within organizations.
As the nature of work evolves, data protection is more challenging than ever. Effectively protecting against data loss and insider risk in today’s environment requires a people-centric approach to data loss prevention (DLP).
Download our guide to learn how to build a unified people centric DLP program. Whether...
Break thhe attack chain. Protect your people from data loss.
Nearly 80% of organizations experienced one or more data breaches in the past 12 months. That risk is only increasing in an era of remote working and distributed teams. Data loss can stem from misconfigured cloud services, outside attackers as well as...
Federal authorities have accused a Chinese national who worked as a CTO in a Google supercomputer data center of stealing the company's proprietary artificial intelligence secrets and sharing them with Chinese companies, according to an indictment unsealed on Wednesday.
HHS has fined a New York City medical center $4.75 million to settle potential HIPAA violations discovered during an investigation into a hospital insider who sold patient data to identity thieves in 2013. The hospital said it has beefed up its security and privacy since the incident occurred.
Mimecast announced the acquisition of human risk management solutions specialist Elevate Security as part of its initiative to enhance digital workplace protection. The move aims to address evolving cyberthreats by offering insights into human behaviors and risks and empowering customers.
Whether because they're malicious, oblivious to company rules or outsmarted by hackers, insiders pose a mounting degree of risk to companies. Hunting for outside hackers offers lessons in preventing insider incidents, said Thomas Etheridge, CrowdStrike chief global professional services officer.
The chief operating officer of an Atlanta-based cybersecurity firm has pleaded guilty and agreed to pay restitution of more than $818,000 in a federal criminal case in which he admitted hacking a Georgia medical center in 2018 in an effort to drum up business for his company.
Federal regulators issued new guidance materials for HIPAA-regulated entities, including a document stressing the importance of sanction policies for workforce members who violate HIPAA, plus two new resources for healthcare providers and patients regarding telehealth privacy and security risks.
Being an independent firm under TPG's ownership will allow Forcepoint G2CI to invest in defense-grade cyber tools such as insider threats and content disarm and reconstruction. Separating Forcepoint's government security practice will allow it to focus on secure remote access to classified networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.