In today's IT environment, one of the biggest risks to a corporation's valuation is a security breach. Security Vendors make wide claims about the effectiveness of their products - making it almost impossible to identify the right vendor for your security needs.
From scanners and traditional pen tests to bug bounty...
In 2020, trust is crucial. A huge amount of work goes into building a brand and maintaining loyalty, but when data breaches happen, trust evaporates quickly. Eighty-one percent of consumers have said they would stop doing business with brands online after a breach.
This Report is the essential guide for CISOs and...
Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack."
When it comes to a breach and exposed data, a digital risk protection solution represents a way to gain visibility into your organization's exposure across the open, deep and dark webs, helping to reduce the risks of potential external threats. This e-book outlines the essential elements and use cases of a mature and...
The time is running out, and there are two questions you need to answer:
What's the impact of security breaches on your organization?
What security measures should you choose to improve product security?
Luckily, this whitepaper helps you answer both of them.
Download this Whitepaper to discover how you can...
The human factors of cybersecurity represent the actions or events where human error results in a successful hack or data breach. Other than hackers taking advantage of naturally existing weak entry points, your biggest threat and vulnerability could be coming from the inside. Whether it's a well-meaning employee who...
Books retailer Barnes & Noble is investigating a security incident involving unauthorized access to its corporate systems, including those storing customers' information. To begin its mitigation efforts, the company shut down its systems, which meant its Nook e-book platform was offline.
A recent ransomware attack on a provider of software used by firms involved with COVID-19 vaccine development and other drug clinical trials illustrates increasing cyberthreats facing medical industry supply chain partners.
Privacy regulators in Germany have slammed clothing retailer H&M with a $41 million fine for collecting and retaining private employee data in violation of the EU's General Data Protection Regulation. H&M has apologized, instituted changes and promised to financially compensate employees.
The latest edition of the ISMG Security Report features an analysis on why criminals continue to use darknet markets, despite the risks. Also featured: Hackers target Virgin Mobile KSA; coping with COVID-19 stress.
As the tally of reported heath data breaches related to the May ransomware attack on Blackbaud continues to climb, so do the number of lawsuits filed against the cloud-based fundraising software vendor.
The latest edition of the ISMG Security Report analyzes whether a leaked database compiled by a Chinese company should be a cause for serious concern. Also featured are discussions on vulnerability disclosure challenges and risks posed by using social media apps for payments.
Dunkin' Brands' settlement with the New York state attorney general of a lawsuit tied to a 5-year-old data breach affecting its Perks rewards cardholders could open the door to suits by other states - as well as customers.
A security incident in which hackers used social engineering techniques to divert Department of Veterans Affairs payments intended for healthcare providers compromised the personal information of 46,000 U.S. veterans.
What's one of the worst things that can happen during a pandemic? The answer is anything that gives people less reason to trust in their public health system to handle the crisis. Enter a data breach that has exposed personal information for everyone who's ever tested positive for the disease in Wales.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.