Data breaches: Preventing and responding

Data breaches: Preventing and responding

It seems as though every day, there’s news of another data breach. As the threats of data breaches continue to evolve, organizations must prepare to respond. Best case scenario, organizations will take precautionary steps to prevent breaches whenever possible. But why are data breaches such a prevalent threat to the modern enterprise? Claudette McGowan, Chief Executive Officer at Protexxa, explains, “We’ve seen this rush to digitize everything. As this world is changing and going from…

Read More

Security leaders weigh in on Life360 data breach

Security leaders weigh in on Life360 data breach

Life360 was impacted by a data breach, which they announced in early June. The malicious actors behind the data breach have appeared to target systems associated with Tile, a Life360 subsidiary. Possibly compromised information may include client names, phone numbers, addresses, email addresses and identification numbers for tile devices.  Security leaders weigh in  Piyush Pandey, CEO at Pathlock: “In this instance, it appears that access was given using the admin credentials of a former Tile…

Read More

In the last year, 70% of organizations were targeted with BEC attacks

In the last year, 70% of organizations were targeted with BEC attacks

A report by Arctic Wolf shows that business email compromise (BEC) incidents are a common occurrence, as 70% of organizations experienced an attempted attack in the last year. 29% of these organizations became victims of one or more successful BEC attacks. The report also discussed ransomware. 45% of the respondents state that their organization experienced a ransomware incident in the last 12 months, with 86% of those incidents involving successful data exfiltration.  Among organizations that…

Read More

The 3 pillars of access control

The 3 pillars of access control

The 3 pillars of access control | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How ransomware is evolving to evade detection

How ransomware is evolving to evade detection

How ransomware is evolving to evade detection | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to cut the line on increasingly phishy hackers this tax season

How to cut the line on increasingly phishy hackers this tax season

How to cut the line on increasingly phishy hackers this tax season | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Mitigating security risks with an evolving workforce

Mitigating security risks with an evolving workforce

Mitigating security risks with an evolving workforce | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to recover from a cyberattack

How to recover from a cyberattack

How to recover from a cyberattack | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2