Customers of Indian payments platform MobiKwik appear to have gotten a lucky break: A listing for 8.2TB of stolen data pertaining to 99 million customers was withdrawn by a cybercrime forum seller, supposedly because of the public risk posed. MobiKwik continues to deny that it was breached. Who's to be believed?
Projects with potential cybersecurity components included in the Biden administration's $2 trillion infrastructure spending proposal include upgrading the aging and insecure electrical grid, addressing supply chain vulnerabilities and supporting research on artificial intelligence and quantum computing.
Although SolarWinds has released a second round of patches for flaws in its Orion network monitoring platform that was targeted in a supply chain attack, some security experts say organizations need to go far beyond patching to manage the risks involved.
Security practitioners often tread a fine and not entirely well-defined legal line in collecting current and meaningful research. This research can also pose ethical questions when commercial sources for stolen data fall into a gray area.
Many organizations are unprepared for their employees to be entirely remote. Businesses have had to make quick decisions to implement the right technology needed to ensure that employees can safely access corporate applications and data.
One of the most effective ways for your teams to make a seamless transition to...
Whether it’s ensuring technology doesn’t go down, employees can work from home securely, or communicating to customers, developing a business contingency plan before a disaster strikes helps to mitigate risks. Unfortunately, many organizations don’t develop a continuity plan until it's too late--resulting in...
With vaccines on the way, there is light at the end of the 2020 tunnel. Once the threat of COVID-19 begins to lesson because of the vaccine, we can hopefully begin to see our economy bounce back. With a more hopeful eye to the future, OneLogin reached out to leaders across the Security and Identity and Access...
Android device users are being targeted by a sophisticated spyware app that disguises itself as a "system update" application, warns mobile security firm Zimperium. The app can steal data, messages and images and take control of phones.
The Government Accountability Office is urging the U.S. government to respond more rapidly to cybersecurity issues, especially in the wake of the SolarWinds supply chain attack that led to the breach of nine federal departments as well as about 100 companies.
The zero-day attacks against Accellion's File Transfer Appliance show that a number of big-name firms continued to use the legacy technology - even though more secure, cloud-based options were available. Evidently, many CISOs didn't see a compelling reason to move on. Of course, now they do.
With the explosion of remote business, we are
now digitizing many of our documents and
processes. Jay Schiavo of Entrust explains what
new mindset this shift requires and shares advice for
organizations currently making the shift.
Download this eBook to learn more about:
What’s needed to ensure document...