Tag "Data Breach"

Back to homepage
Industry Insights

2017 breaks record for new vulnerabilities

More than 20,000 new vulnerabilities were cataloged in 2017 according to breach analysis specialist Risk Based Security.The figures from the company’s own VulnDB eclipsed the total covered by MITRE’s Common

IT Compliance

Why the cyber threat landscape could grow under GDPR

The General Data Protection Regulation (GDPR) is only 3 short months away, with the incoming regulation seeing businesses across Europe and beyond bolster their cyber security in an effort to

Identity Theft

2 Billion Files Leaked in US Data Breaches in 2017

Nearly 2 billion files containing the personal data of US citizens were leaked last year—and that number could be significantly underreported.In 2017, a total of 551 breaches affected organizations, with

Software

Poor patching, user education leave healthcare providers sitting ducks for cyber attacks

Despite the masses of highly sensitive data that healthcare companies manage, new analysis has warned that chronically poor endpoint security, weak patching practices and high exposure to social engineering make

Identity Theft

Financial Services Sector Breaches Triple in Five Years

Financial services firms are targeted more than any other sector, with breaches tripling over the past five years, according to the latest report from Accenture.The consultancy conducted over 2100 interviews

Hardware/Network

What online attacks will dominate the threat landscape this year?

This article will focus on three different and pressing issues that the IT security industry needs to be prepared for during 2018 – the increase of cyber threats via social

Hardware/Network

Let’s Not Make the Distributed Internet Insecure

We built the internet to be fast and efficient, but made mistakes that have led to the security problems we see today: DDoS attacks, massive breaches, thefts of huge amounts

Software

Never Mind Malware – Social Engineering Will Be Your Biggest Threat This Year

As we enter a new year, IT security teams and cyber-criminals are both already searching for the development that will tip the scales in the on-going cyber arms race. A

Hardware/Network

Tackling the insider threat: Where to start?

Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of systems when he or she

Identity Theft

UK government websites infected by cryptocurrency miners

Hackers injected malicious code into a plug-in for the blind in order to mine for the cryptocurrency Monero.In an attempt to mine cryptocurrency, hackers have injected malicious code into a