Trust Through Transparency: Regulation’s Role in Consumer Confidence

Trust Through Transparency: Regulation’s Role in Consumer Confidence

The flow of personal information has become a cornerstone of modern business operations. From online shopping to social media, data collection is ubiquitous, and consumers are taking notice and taking action.   For the past six years, Cisco has been studying consumer sentiment across the privacy landscape and the evolution of privacy from a compliance matter to a consumer requirement. For consumers, knowing their personal information is being handled responsibly is crucial to earning and building…

Read More

Report Highlights Rising Risks in Sensitive Data Management

Report Highlights Rising Risks in Sensitive Data Management

The volume of sensitive data that companies are harbouring in non-production environments, like development, testing, analytics, and AI/ML, is rising, according to a new report. Executives are also getting more concerned about protecting it — and feeding it into new AI products is not helping. The “Delphix 2024 State of Data Compliance and Security Report” found that 74% of organisations that handle sensitive data increased the volume kept in non-production, also known as lower, environments…

Read More

National Public Data Breach: 2.7bn Records Leaked on Dark Web

National Public Data Breach: 2.7bn Records Leaked on Dark Web

In August, a hacker dumped 2.7 billion data records, including social security numbers, on a dark web forum, in one of the biggest breaches in history. The data may have been stolen from background-checking service National Public Data at least four months ago. Each record has a person’s name, mailing address, and SSN, but some also contain other sensitive information, such as names of relatives, according to Bloomberg. How the data was stolen This breach…

Read More

Embrace the data sprawl, securely

Embrace the data sprawl, securely

Data is the lifeblood of every enterprise, so why does the task of managing and securing rapidly expanding volumes and types of data and new, modern threats continue to be a formidable challenge for most organizations? According to the Identity Theft Resource Center (ITRC), 2023 set a new record for data breaches, with data compromises jumping 78% over 2022. Malicious actors obviously see the value of data — but without visibility and controls into where…

Read More

A Human-Centric Security Approach, Supported by AI

A Human-Centric Security Approach, Supported by AI

Artificial Intelligence & Machine Learning , Events , Next-Generation Technologies & Secure Development Protect People and Infrastructure Simultaneously: Proofpoint CEO Sumit Dhawan Mathew J. Schwartz (euroinfosec) • May 16, 2024     Sumit Dhawan, CEO, Proofpoint To address the cliche of people being the weakest link, cybersecurity company Proofpoint said it’s putting humans at the center of its security. See Also: From CNAPP to CDR: The Cybersecurity Road Ahead Data and…

Read More

Data Power: What the EU Data Act Means for You

Data Power: What the EU Data Act Means for You

On 27 November the European Council adopted the EU Data Act, a first-of-its-kind law that aims to unlock the value of ‘industrial data’ in the European Union (EU). It will enter into force early 2024, starting the 20-month clock for companies to comply with its requirements. This is the culmination of almost four years of work stretching back to the European Data Strategy. Cisco has been engaging throughout the legislative process and welcomes the opportunity…

Read More

Air-gapped advantages in a non-air-gapped world

Air-gapped advantages in a non-air-gapped world

Air-gapped advantages in a non-air-gapped world | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

US enterprises hit hard by short-staffed security operations centers

US enterprises hit hard by short-staffed security operations centers

US enterprises hit hard by short-staffed security operations centers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

8 companies per day have data uploaded to dedicated leak sites

8 companies per day have data uploaded to dedicated leak sites

8 companies per day have data uploaded to dedicated leak sites | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Russian APT groups continue attacks with wipers and ransomware

Russian APT groups continue attacks with wipers and ransomware

Russian APT groups continue attacks with wipers and ransomware | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3