Please turn on your JavaScript for this page to function normally.
stock price
Digital transformation, regulations impacting data security decisions at financial organizations

Almost half (49%) of global financial services organisations have experienced a data breach in the past, according to the 2017 Thales Data Threat Report, Financial Edition. …

element
Key elements of a secure, sensitive information sharing strategy

It’s been said, data is like the new oil. What does this mean exactly? Like oil, data is a commodity. But unlike oil, the value of data isn’t susceptible to supply and demand. …

Uber
Uber to get privacy audit every two years

Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by …

Power lines
How a port misconfiguration exposed critical infrastructure data

Much has already been said and written about the dangers of potential cyber attacks targeting the electric/power grid. And in Ukraine, they’ve already gone from …

Users lock
Google Groups misconfiguration leads to sensitive data leaks

If your employees are using Google Groups to discuss issues and ideas, you might want to check whether the sharing setting for these groups is set to “Private”. …

Google security
Google introduces new protections to prevent app-based account compromise

Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no …

cloud binary
Dow Jones customer data exposed due to cloud misconfiguration

US-based publishing and financial information firm Dow Jones & Company is the latest casualty of a cloud database misconfiguration error. In late May, UpGuard’s …

London
A UK business will spend more than £1m recovering from a data breach

A UK business would have to spend £1.1m on average to recover from a breach – more than the global average of £1m. An NTT Security study of 1,350 non-IT business decision …

tunnel
Businesses overconfident about keeping attackers at bay

Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter …

idea
Five crucial ways to help keep a system safe from harm

We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …

hospital
The path to protecting health data: 10 steps to get started

The information in your medical records can be more valuable than your credit card numbers to a cybercriminal. Experts estimate healthcare data is 50 times more valuable to …

face
Organizations are intimidated by global privacy and data security regulations

While companies generally are aware of and intimidated by global privacy and data security regulations, they fail to properly understand and address necessary organizational …

Don't miss

Cybersecurity news