Student Loan Breach Exposes 2.5M Records
2.5 million people were affected, in a breach that could spell more trouble down the line.
More results...
2.5 million people were affected, in a breach that could spell more trouble down the line.
Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.
Optimism bias is the belief that each of us is more likely to experience good outcomes and less likely to experience bad outcomes. How prevalent is this in the cybersecurity industry? If you’re a salty security professional like me, you already know the answer.
The assumption that software security can stay ahead of the hackers is not true because the software security industry is always reacting to threats that hackers expose. Once hackers start exploiting a flaw in an application, security …
While reading the news this morning about yet another successful data breach, I couldn’t help but wonder if the hyperbole used in reporting about data breaches is stifling our ability to educate key stakeholders on what they really need to know.
Today…
Email is one of the most critical business tools and a major component of the lives of many people. At the same time, it seems to lack adequate security as the Clinton campaign email leaks and the publication of France’s Macron emails have sho…
A lack situational awareness is hurting the ability of companies and the public sector to adequately protect sensitive information. Intellectual property, sensitive business data, personally identifiable information and infrastructure access, …
The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, finan…
We live in a time of daily breach notifications. One recently affected organization in Germany put out a statement which said: “The incident is not attributable to security deficiencies.” and “Human error can also be ruled out.” They went on say that …
This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce data …