Third party risk management is imperative today for organizations large and small. Senior executives and Boards of Directors are increasingly asking for updates into their vendor risk management programs and looking for demonstrable progress in reducing third party cyber risk.
While Finance organizations tend to...
CryptoLocker. GoldenEye. Locky. WannaCry. It's no secret that 2017 is shaping up to be the most notorious year on record for ransomware. Even a casual news consumer can identify several, if not all, of the menacing ransomware attacks that have cost worldwide businesses an estimated $1 billion this year.
Download...
The vendor-related research focuses on solution providers that are supplying proactive next-generation endpoint security services covering prevention, detection, and response. EMA provided all identified participants the opportunity to participate in a vendor-answered questionnaire and interviews. EMA then combined...
Key gaps in how healthcare entities defend against cybercrime hacking have emerged. Even organizations strictly adherent to HIPAA, NIST or other regulators are still unaware of how their practices compare to their industry peers and whether or not they are lagging behind.
Has your organization assessed and mitigated...
An apparently misconfigured Amazon repository that exposed on the web medical data for approximately 150,000 patients serves as another important reminder of the need to protect cloud-based health information from being inadvertently accessible to the public.
A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
The RSA Conference returns to Abu Dhabi in November, and event organizers Linda Gray Martin and Britta Glade say this year's agenda is packed with new speakers and topics unique to this growing annual event.
Security researchers have discovered websites run by credit bureaus Equifax and TransUnion were both affected by dodgy code that redirected users to adware and malware. Both issues are fixed, but the situations beg questions about how closely the companies monitor their online security.
With telehealth on the cusp of rapid growth, healthcare entities must carefully assess and address critical privacy and security issues, says regulatory attorney Emily Wein.
Artificial Intelligence (AI) and machine learning are among the top industry buzzwords of the year. But how can AI truly make a significant impact on organizations' cybersecurity operations?
Download this eBook that discusses:
The value and limits of traditional AI
Why and how the human element is critical to...
Organizations today are making the same security mistakes with APIs that they made with their websites 10 years ago. Common mistakes such as unnecessary bloat of API responses, making too many round trips for content and ignoring some of the low-hanging protocol fruit are negatively impacting both security and...
Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data - and hold it hostage until payment is made. So how can you keep your organization's data protected?
Download this whitepaper and learn:
Why ransomware has seen such explosive growth
How to recover encrypted data more...
Is the European GDPR going to change your data security strategy?
Organizations around the world that serve customers and individuals in the EU will be required to put in place security policies to address different risks and effectively enforce these policies with technical controls - or potentially face fines of...
Assessing and assigning trust in endpoints is a big challenge enterprises face as they move to the cloud. However, a strategy exists which can protect apps and data across many endpoint scenarios, allowing IT to maintain balance between access and risk.
Download this whitepaper and learn how to:
Mitigate risk...
It's a tale that reads stranger than fiction, a true Tom Clancy-ish yarn: Israeli spies hacked Kaspersky Lab, discovering that Russia has been using the company's pervasive anti-virus software to spy on U.S. spies. Will Kaspersky Lab survive?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.