The success of security operations centers will depend on how well they blend key technologies - including detection, user behavior analytics and orchestration, says Haiyan Song of Splunk, who offers strategic insights.
George Orwell's "1984" posited a world in which Big Brother monitored us constantly via "telescreens." But thanks to our "smart" AI home assistants - from Google, Amazon and others - we're increasingly installing the monitoring equipment ourselves, and it may "hear" much more than we realize.
Health insurer Premera Blue Cross has signed a $10 million HIPAA settlement with the attorneys general of 30 states in the wake of a 2014 data breach that exposed personal information on more than 10.4 million individuals nationwide.
Cybersecurity firm McAfee is reportedly planning a return to the public market, eyeing an IPO that could happen as early as later this year, raise $1 billion and value the company at $5 billion, The Wall Street Journal reports. The news comes amid a record volume of technology sector IPOs, including for Crowdstrike.
Security researchers have found yet another unsecured database that left personal data exposed to the internet. In this latest case, a MongoDB database containing about 188 million records, mostly culled from websites and search engines, was exposed, researchers say.
Applications have become primary targets for two vastly different, but equally dangerous, types of cyberattacks. Successful application breaches can lead to financial fraud, stolen IP, and business disruption.
The relationship between American Medical Collection Agency and its laboratory clients affected by the company's data breach will be closely examined as breach-related lawsuits progress, says attorney Paul Hales, a HIPAA specialist, who explains why.
As mass-scale attacks become more sophisticated, leading organizations are benefiting from behavioral biometrics to protect their most valuable assets.
Facing a daily stream of attacks that outdated solutions could not identify, one top international bank implemented 360-degree protection for one of their most...
Getting hit by "constantly-changing attacks" is the new normal in a developing threat landscape.
One eCommerce company used the NuData platform to identify and adapt to evolving attacks.
Download this case study to learn more about:
How to combat mass scale attacks at your login placement;
Blocking repeat attacks...
As digital touch points rise, so too do consumer expectations of simplicity, convenience, and security.
These expectations surrounding the merging of digital and physical interactions open the door to new opportunities and even bigger challenges.
Download this report to learn more about:
Retailers and ecommerce organizations are responsible for handling a wealth of customer data, including Personally Identifiable Information (PII) such as names, addresses, credit card details and passwords.
However, this access to customer data makes retailers one of the biggest target groups for cybercriminals....
Website breaches are becoming a daily occurrence. Organizations, entrusted with millions of customer data points, are failing to protect consumers adequately and as a consequence, losing valuable data.
Despite the expectation that companies should be prepared for both accidents and deliberate attacks, there is a...
New Ensighten research shows 83% of global organizations anticipate a potential data breach - yet two-thirds are not armed for prevention against this cyber threat. The risks revealed by this research into these concerning approaches to data security vulnerabilities cannot be allowed to persist, lest they threaten...
Like many risk-averse organizations, state and local governments are missing out on the benefits of full-scale cloud adoption because they are paralyzed by the complexities associated with trusting their data to a third party. It's no surprise that government agencies have concerns about storing citizen data in the...
Customer accounts are an integral tool to help merchants foster customer loyalty. But when login credentials are compromised, they present a unique opportunity for fraudsters to commit CNP fraud and steal customer PII. In 2018 alone, Account Takeover attacks resulted in over $11 billion in losses.
The fallout from...