data security
Key elements of a secure, sensitive information sharing strategy
It’s been said, data is like the new oil. What does this mean exactly? Like oil, data is a commodity. But unlike oil, the value of data isn’t susceptible to supply and demand. …
Uber to get privacy audit every two years
Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by …
How a port misconfiguration exposed critical infrastructure data
Much has already been said and written about the dangers of potential cyber attacks targeting the electric/power grid. And in Ukraine, they’ve already gone from …
Google Groups misconfiguration leads to sensitive data leaks
If your employees are using Google Groups to discuss issues and ideas, you might want to check whether the sharing setting for these groups is set to “Private”. …
Google introduces new protections to prevent app-based account compromise
Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no …
Dow Jones customer data exposed due to cloud misconfiguration
US-based publishing and financial information firm Dow Jones & Company is the latest casualty of a cloud database misconfiguration error. In late May, UpGuard’s …
A UK business will spend more than £1m recovering from a data breach
A UK business would have to spend £1.1m on average to recover from a breach – more than the global average of £1m. An NTT Security study of 1,350 non-IT business decision …
Businesses overconfident about keeping attackers at bay
Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT professionals still believe perimeter …
Five crucial ways to help keep a system safe from harm
We’re living in an incredible age of technology, invention and innovation. It’s hard to imagine that just a short time ago we couldn’t order groceries for delivery from …
The path to protecting health data: 10 steps to get started
The information in your medical records can be more valuable than your credit card numbers to a cybercriminal. Experts estimate healthcare data is 50 times more valuable to …
Organizations are intimidated by global privacy and data security regulations
While companies generally are aware of and intimidated by global privacy and data security regulations, they fail to properly understand and address necessary organizational …
Largest US voter data leak shines light on many problems
If US citizens weren’t convinced by now that they have long lost control of their data, the fact is more than obvious after a misconfigured database containing 198 …
Featured news
Resources
Don't miss
- Resecurity introduces AI-powered GSOC at NATO Edge 2024
- Windows, macOS users targeted with crypto-and-info-stealing malware
- How to choose secure, verifiable technologies?
- December 2024 Patch Tuesday forecast: The secure future initiative impact
- Building a robust security posture with limited resources