Tag: Data Breaches
4 Immediate Measures to Execute After a Cyberattack
                Whether it is a global pandemic or the new normal, cybercriminals always find ways to target organizations and individuals for valuable digital assets. Most...            
            
        Have I Been Pwned Goes Open Source; Partners with FBI
                Compromised credentials pose severe security threats to both organizations and individuals. Attackers often leverage stolen/leaked passwords in brute force attacks to compromise user accounts....            
            
        Verizon 2021 DBIR: Cyberattacks Continue to Rise During Pandemic
                From phishing attacks, identity theft to brand impersonation attacks, cybercriminals leveraged all kinds of attack vectors during the pandemic. This resulted in a huge...            
            
        NSW Government Proposes Mandatory Notification of Data Breach Scheme
                The organizations in New South Wales (NSW), Australia, would mandatorily need to report data breaches to the law enforcement authorities. The NSW government recently...            
            
        Here’s what the experts have to say about World Password Day
                Today is World Password Day. A day meant to remind everyone about the importance of protecting themselves through strong passwords. World Password Day is...            
            
        Fine-tune Your Passwords this World Password Day 2021
                Passwords – the most common and effective authentication method to securely log in systems and keep data secure – have now become a potential...            
            
        Data Protection Sustainability: A Self-compensating System
                How substantial is cybersecurity compliance to engendering reliability in data protection processes? While we may defer answering this question, the importance placed on cybersecurity...            
            
        Supply Chain Security – A CISO Point of View
                Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their...            
            
        Leveraging Security Psychology to Mitigate Cybersecurity Risk
                Problem Statement: Human risk is real, and information and cybersecurity awareness trainings are not assuring and adequate. Period.
Often security trainings are compliance-focused, as against...            
            
        Why Businesses are Investing in Data Privacy
                Stories about data leaks from social media sites surface with alarming regularity these days. And it’s not just social media. Stock exchanges, credit card...            
            
         
            
 
		