The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
The European Union’s General Data Protection Regulation, or GDPR for short, takes effect on May 25, just three months from now. It’s the biggest new compliance regulation in many years, and businesses that are unprepared may face some unpleasant consequences. That’s where a data protection impact assessment, often shortened to DPIA, can help. We’ll get…
IBM QRadar and Splunk are two of the top security information and event management (SIEM) solutions, but each product offers distinct benefits to potential buyers. Both SIEM solutions were featured in eSecurity Planet‘s list of top 10 SIEM products. Both companies offer strong core SIEM products, but differ in intelligence features and integration with…
Artificial intelligence is already redefining cybersecurity, exposing sophisticated attacks and adding a level of Terminator-style relentlessness to threat detection tools and anti-malware software. AI is even being used by a startup to scour the dark web for evidence that its customers have been hacked and their sensitive data is being peddled on illicit marketplaces.…
By practically every measure, cybersecurity threats are growing more numerous and sophisticated each passing day, a state of affairs that doesn’t bode well for an IT industry struggling with a security skills shortage. In a recent ESG and ISSA survey, 70 percent of cyber security professionals felt the cybersecurity skills gap had an effect on…
Twenty-nine percent of U.S. businesses suffered a data breach in the past year, according to a recent HSB survey of 403 senior executives in the U.S., conducted by Zogby Analytics. Two thirds of respondents whose businesses were breached said their company’s reputation was negatively affected by the incident. Twenty-seven percent of respondents spent between $5,000…
4iQ researchers recently came across a single 41 GB file containing a searchable database of more than 1.4 billion clear text login credentials on the dark Web. The largest-ever password dump brings together credentials stolen in 252 separate breaches, including the LinkedIn breach. When the researchers came across the file last week, new data had…
Uber yesterday admitted that it covered up a massive data breach of 57 million customers’ and 600,000 drivers’ information in late 2016 by paying the hackers a $100,000 ransom. In a statement, Uber CEO Dara Khosrowshahi said two hackers “inappropriately accessed user data stored on a third-party cloud-based service that we use.” Specifically, Bloomberg reports,…
The perfect IT security solution is one that makes an enterprise completely secure and “unhackable,” where no unauthorized parties can get onto the network, access confidential data, deny service to legitimate users, or otherwise carry out any malicious or unwanted activities. Anyone who reads the security news these days knows that perfect security is…
Concern about software supply chain security and the potential insertion of malware backdoors is at the forefront of cyber security challenges, but the problem has been around for decades and governments and industry are just getting around to addressing it now. You might question my assertion that this has been a concern for decades, so…