Tag "Cyber Incident"

Back to homepage
Software

How Automation Helps Security Managers

It’s the nature of security operations: the worse the situation, the more you need everything to be working perfectly. Any issues with your program need to be figured out ahead

Hardware/Network

How Hackers Hit Printers

New Booz Allen Hamilton report advises companies to include printers in their overall security strategy. Networked printers increasingly are becoming targets of hackers as these devices often aren’t secured by

Software

Cryptocurrency Platform Suffers Data Breach

Using its Facebook page to connect with global customers, Atlas Quantum, a cryptocurrency investment platform, announced a security incident that exposed the personal details of about 261,000 users, according to Have I Been

Mobile

No Financial Data Compromised in T-Mobile Breach

The cybersecurity team at T-Mobile discovered and halted an attack after a malicious actor had gained unauthorized access to the personal information of some customers during an ongoing security breach that the

Software

12% of Security Professionals Have Considered ‘Black Hat’ Activity

Numerous studies focus on aspects of cybercrime aftermath, such as a company’s lost reputation or its struggles to obtain future clients after incidents. However, Malwarebytes commissioned Osterman Research to determine the direct

Software

How to Go From No Incident Response Program to SOAR

When interacting with companies that are considering purchasing a security orchestration, automation, and response (SOAR) solution, I often hear them express the concern that their current incident response program is

IT Compliance

Time Is Up: Five Ways To Mitigate Risk From GDPR

In May 2018, the European Union General Data Protection Regulation (EU GDPR) went into effect. With the deadline now behind us, there is confusion and ambiguity with respect to definitions,

Software

Government Security Analysts Submerged with Threats

The government is relying on a “skeleton staff” of security analysts to root out and respond to online threats, according to a new FoI request. SIEM specialist Huntsman Security wanted to find

Industry Insights

Do your users understand your cybersecurity policy?

ObserveIT surveyed more than 1,000 full-time employees ages 18-65+ at organizations with more than 500 employees on their understanding and awareness of cybersecurity programs. The results show the majority (65

Identity Theft

Top 10 list of dark web activities that indicate a breach

Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incident, has taken place. Click here to