March 27, 2019 Data Leak Involving Family Tracking App Exposed 238,000 Users’ Real-Time Locations for Weeks 2 min read - A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.
Incident Response March 26, 2019 When It Comes to Incident Response, Failing to Plan Means Planning to Fail 3 min read - In today's treacherous threat landscape, it seems the odds are overwhelmingly stacked against cyberdefenders. But there is one advantage attackers can't take away: thorough incident response planning.
Application Security March 5, 2019 Blockchain: Making the Reward Much Greater Than the Risk 5 min read - The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
CISO February 28, 2019 How Can CISOs Improve Board Governance Around Cyber Risk Management? 4 min read - While some organizations have improved their board governance processes on cybersecurity issues, much of the work to drive progress falls on the shoulders of the CISO.
CISO February 27, 2019 Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security 4 min read - We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity.
Data Protection February 26, 2019 When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current 4 min read - The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.
Data Protection February 21, 2019 Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security 4 min read - While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.
February 20, 2019 Threat Actors Impersonate Oil and Gas Companies in Latest Shade Ransomware Attack 2 min read - Digital criminals tried to impersonate oil and gas companies in a recent attack campaign distributing Shade ransomware.
Data Protection February 19, 2019 Lessons from the Encryption Front Line: Core Components in the Cloud 3 min read - Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
Data Protection February 15, 2019 Are You Really Covered by Your Cyber Insurance? 5 min read - Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.