The massive data breach suffered by Equifax in 2017 "was entirely preventable," according to a report released by the House Oversight Committee's Republican majority. Some Democratic lawmakers have slammed the report for failing to advance legislative or oversight changes to help prevent breaches.
To combat cyberattacks, more nations must not only hold nation-state attackers accountable, but also better cooperate by backing each other's attribution, said Estonian politician Marina Kaljurand, who chairs the Global Commission on the Stability of Cyberspace, in her opening keynote speech at Black Hat Europe 2018.
Consumer organizations in seven countries plan to file complaints alleging that Google is violating the EU's General Data Protection Regulation via its location, web and app activity tracking, in what could be a blow to the search giant's lucrative but data-hungry targeted advertising business.
Uber has been slammed with $1.2 million in fines by U.K. and Dutch privacy regulators for its cover-up of a 2016 data breach for more than a year. The breach exposed millions of drivers' and users' personal details to attackers, whom Uber paid $100,000 in hush money and for a promise to delete the stolen data.
A British lawmaker has obtained sealed U.S. court documents to reveal internal Facebook discussions about data security and privacy controls, as Parliament probes Facebook and other social media firms as well as Russian interference and fake news.
If you're dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you're probably considering some form of software-defined wide area networking
With the variety of constraints that you face, selecting the right SD-WAN solution for...
The traditional WAN is no longer an effective solution for today's
distributed enterprise. Organizations are overcoming significant
security and network issues by moving to SD-WAN. There are
many different SD-WANs on the market today, and IT professionals should
carefully review their options so they are not...
Most organizations are undergoing some form of digital transformation (DX), transforming how they bring products and services to the market - and deliver value to their customers. But DX initiatives bring complexity for network operations teams. With business-critical services distributed across multiple clouds, this...
Many companies have automated some of their security
procedures, but they are even further behind with other
security best practices.
Big chunks of infrastructure remain vulnerable in the
typical organization, with 25% of the infrastructure not
adequately protected at the typical organisation.
British Airways has discovered that hackers compromised payment card data and personal details for 185,000 more customers than it had originally suspected and that its systems were first breached not in August, but April. The airline now counts 429,000 data breach victims.
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone...
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? Join this session to hear our expert offer:
The latest research on insider...
This session looks at two real-life case studies, with different outcomes from the same initial starting point for two companies. The first led to £140k loss due to malicious invoicing; the second led to data exfiltration and reputational damage (as well as ICO reporting due to GDPR).
Malicious actors use common...
This lively, hard-hitting and engaging one-hour workshop is full of practical examples for staff at all levels, offering valuable tips for safe online behavior at work and at home to reduce data breach risks and avoid reputational harm.
Our presenter is Mark Johnson, a seasoned former military intelligence officer,...
In the modern age of technology, in which both organizations and individuals have embraced the wired world, we have also evolved and accepted the "unknown unknown" risk of the corporate and individual subliminal digital footprint, which is open to exploitation, leading to the potential compromise of the end target. It...