Data Breach

Data Breach | News, how-tos, features, reviews, and videos

office meeting / silhouettes with devices and data in the foreground

6 indirect expenses cost money fine penalty pepi stojanovski unsplash

Cybercrime is increasing and more costly for organizations

CIOs need to focus on people-based attacks and use intelligent tools to limit data loss and business shutdowns.

aws_logo

3 ways Amazon can address its web service data risk – and what others can learn from it

Amazon may be facing a potentially data risk as third-party payment processors have been cited to be suspiciously getting sellers' Marketplace Web Service secret keys in the guise of integration.

thumbnail
video

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a...

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

insurance policy

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources make the investment worthwhile.

vulnerable balance egg risk breach security

How to be compliant with data breach notification laws

As a CIO, the bucks stops with you for matters pertaining to data breaches and compliance towards subsequent notifications.

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

sequence 01.00 29 58 30.still001
video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

Man adding coin to web page on laptop

6 tips to pick the right ICO

ICOs are high-risk, high-reward investments. It’s important to know how much one is willing to invest and possibly lose before participating in one.

dark web hacker tablet malware

Widespread cybercrime costs reaching $11.7 million on average per organization

Overall, breaches have increased by 23 percent over the previous year, and demand a security approach that builds resilience from the inside out.

3 sensitive data hacker phone

Whose fingerprints are all over your customer data?

When compared to data warehousing, the data lake paradigm is incredibly appealing. But until you start working with the data, you don’t know what you don’t know. And that can be fatal.

03 crimeware

Why are USB sticks wrinkle-free?

Roughly half of lost USB sticks and other mobile gadgets get returned to owners, which triggers the million-dollar question: What happens to the other half?

Load More