In what the New York Times is calling, “One of the most sophisticated and perhaps largest hacks in more than five years,” malicious adversaries acting on behalf of a foreign government, likely Russian, broke into the email systems of multiple U.S. Federal agencies including the Treasury and Commerce Departments.
The 2020 Clearview AI data breach spawned hundreds of attention-grabbing headlines, and for good reason. The company works closely with law enforcement agencies and other entities by sharing personal information about millions of people, for a variety of purposes. The breach raised many questions about the vulnerability of personal data in general.
For the past few years, a major problem has been mounting in the cybersecurity industry: a people shortage. Even before the outbreak of the current global pandemic, enterprises were hurting in the cybersecurity hiring department. Companies are struggling to find employable cybersecurity professionals to handle an ever increasing and evolving number of new threats from …
Recent advances in cloud data storage capabilities have changed the way many organizations handle data and conduct business. While the expansion of cloud data represents new opportunities for growth, these organizations will have to confront new and emerging security threats unique to the cloud. Cloud Storage Security Challenges These five cloud security threats do not …
Although a relatively new corporate position, Chief Information Security Officers (CISOs) are becoming an integral part of the corporate hierarchy as enterprises begin to take security concerns more seriously. It’s a smart move considering that in 2019 security breaches cost companies on average $3.92 million. Now in 2020, CISOs are facing accelerating old threats along with some brand new ones. Here are the top eight CISO concerns of 2020:
The reality is that most companies and entities are entrusted with sensitive data. As regulations tighten and consumer expectations rise, it is more important than ever to protect data, whenever it is gathered, accessed, shared, or stored. Let’s take a look at a few of the newsworthy data breaches that happened in 2019. Often, studying these cases can inform SecOps teams about what not to do.