VW Vendor Leaves Data Unsecured

VW Vendor Leaves Data Unsecured

A data breach at a Volkswagen vendor has impacted millions of customers and prospective car purchasers across North America.  The breach occurred after information gathered by the vendor between 2014 and 2019 for sales and marketing purposes was stored electronically in an unsecured file for years.  The majority of the individuals whose data was compromised were potential buyers or current customers of luxury car brand Audi. The Volkswagen Group formed Audi in 1969 after it bought the Auto Union…

Read More

REvil Claims Responsibility for Invenergy Hack

REvil Claims Responsibility for Invenergy Hack

Ransomware group REvil has claimed responsibility for a recent cyber-attack on a multinational renewable energy company based in the United States. Invenergy LLC, which is headquartered in Chicago, launched an investigation after unauthorized activity was detected on some of its systems. In a statement issued on Friday, the company said: “At no time were Invenergy’s operations impacted and no data was encrypted.”  Invenergy added that it was complying with data breach disclosure regulations and that it “has…

Read More

Why employees need counterespionage training

Why employees need counterespionage training

Two experts are concerned that employees are no match for nation-state spy services tasked with obtaining a company’s vital intellectual property. Image: Yuichiro Chino/Moment/Getty Images Companies—large and small—need to be aware of espionage threats. If that seems a bit overboard, consider the dramatic increase in the number of incidents related to geopolitical cybercrime. “Many authoritarian governments are doing everything they can, including using their spy services, to build successful businesses and grow their economies,” explained…

Read More

Biden Opposes Conditional Handover of Cyber-criminals

Biden Opposes Conditional Handover of Cyber-criminals

The possibility of a deal allowing for the conditional handover of cyber-criminals between the United States and Russia has been extinguished by American president Joseph Biden.  Russian president Vladimir Putin said on June 13 that he would be willing to make an arrangement with the United States whereby the two countries would exchange cyber-criminals in accordance with agreed-upon  conditions.  Putin, who is due to meet with Biden at a bilateral summit in Geneva on June…

Read More

SOAR Is an Architecture, Not a Product | Anomali

SOAR Is an Architecture, Not a Product | Anomali

Over the past several years, the rising star of security orchestration, automation, and response (SOAR) tools keeps climbing higher. As organizations struggle to handle the crush of alerts surging out of their security controls with not enough cybersecurity professionals to manage the work, SOAR products promise to bring some sanity to the process. The promise is that SOAR platforms can help security operations teams to sail through the massive volume of alerts they face and…

Read More

McAfee a Leader in The Forrester Wave™ Unstructured Data Security Platforms | McAfee Blogs

McAfee a Leader in The Forrester Wave™ Unstructured Data Security Platforms | McAfee Blogs

The mass migration of employees working from home in the last 14 months has accelerated the digital transformation of businesses.  Cloud applications are no longer a “nice to have,” they are now essential to ensure that businesses survive.  This introduces new security challenges in being able to locate and control sensitive data across all the potential exfiltration vectors regardless of whether they are in the cloud; on premise via managed or unmanaged machines.  Attempting to…

Read More

Finding Success at Each Stage of Your Threat Intelligence Journey | McAfee Blogs

Finding Success at Each Stage of Your Threat Intelligence Journey | McAfee Blogs

Every week it seems there’s another enormous breach in the media spotlight. The attackers may be state-sponsored groups with extensive resources launching novel forms of ransomware. Where does your organization stand on its readiness and engagement versus this type of advanced persistent threat? More importantly, where does it want to go? We believe that the way your organization uses threat intelligence is a significant difference maker in the success of your cybersecurity program. Just as…

Read More

Ransomware is the biggest threat, says GCHQ cybersecurity chief

Ransomware is the biggest threat, says GCHQ cybersecurity chief

The head of the UK’s National Cyber Security Centre has warned that ransomware has become the biggest threat to British people and businesses. In a speech being given today by Lindy Cameron, chief executive of the NCSC, to the RUSI think tank, she highlights the need for ransomware problem to be taken seriously, and warns of the “cumulative effect” if society fails to properly deal with the rising threat. Cameron says that although state-sponsored cyber…

Read More

54% of Senior Executives Struggling to Keep up with Threat Landscape

54% of Senior Executives Struggling to Keep up with Threat Landscape

According to a new report by Fujitsu, more than half (54%) of senior executives have struggled to adapt security policies to changes in the threat landscape and working practices. The survey, which Fujitsu carried out in September 2020, provides further evidence that many organizations are at higher risk of cyber-attacks due to the shift to remote working during COVID-19, with cyber-criminals taking advantage of the rising number of connections and devices to target corporate systems. The findings also indicated that…

Read More

The great cloud computing surge

The great cloud computing surge

We reached a big milestone in 2020: Cloud services revenue finally surpassed enterprise spending on data centers, according to the Synergy Research Group. One of the longest-running trends in IT – moving to the cloud – has been turbocharged, driven in part by a pandemic that pushed enterprises to avoid the logistical challenges and capital expense of deploying on prem. But the endless capacity to add horsepower without provisioning your own infrastructure isn’t the biggest…

Read More
1 2,228 2,229 2,230 2,231 2,232 2,582