In light of the massive data dump called Collection #1 and with more available for download and exchange in the underground, here are a few reminders for users and enterprises on how to mitigate threats on their personal information and enterprise assets.
Data Breach: A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner. Read more
To move forward, we need to look into the past to figure out what the best course of action is. Take a trip down memory lane with this infographic to see how far we've come in securing the digital world.
A review of the first half of 2018 shows a threat landscape that not only has constant and familiar features but also has morphing and uncharted facets: Ever-present threats steadily grew while emerging ones used stealth.
Data breaches take time and a lot of effort to pull off, but successful breaches can affect not just organizations, but also millions of people. Learn what a data breach is, what types of data is usually stolen, and what happens to stolen data.
With today’s ever-evolving threat landscape, data breaches are no longer isolated cases. Responding to and remediating data breaches calls for a proactive approach — something that managed detection and response (MDR) can provide.
Online survey hosting company Typeform announced that attackers accessed their server to steal clients’ data. Organizations are starting to disclose their use of the platform and individually notify affected customers.
Big breaches in June: Marketing data firm Exactis inadvertently leaked personal information of American citizens and businesses, while Paris-based Fastbooking and ticketing distributor Ticketmaster UK suffered data breaches.