Advertisement
Top

Tag: sensitive data


Application security, Security

Neosec Introduces Automated Tokenization to Enable Full API Visibility Without Exposure of Sensitive Data

November 15, 2022

Via: Dark Reading

Neosec, the pioneer in discovering and identifying API threats using behavioral analytics, today announced that it now tokenizes API activity data to enable organizations to fully see and store API data, removing the possibility of keeping sensitive data at-rest. Today, […]


Hacker, Threats & Malware

FBI, CISA, and NSA Reveal How Hackers Targeted a Defense Industrial Base Organization

October 5, 2022

Via: The Hacker News

U.S. cybersecurity and intelligence agencies on Tuesday disclosed that multiple nation-state hacking groups potentially targeted a “Defense Industrial Base (DIB) Sector organization’s enterprise network” as part of a cyber espionage campaign. “[Advanced persistent threat] actors used an open-source toolkit called […]


Data loss, Threats & Malware

5 Best Practices for Building Your Data Loss Prevention Strategy

September 15, 2022

Via: Dark Reading

Several recent high-profile instances of data loss serve as cautionary tales for organizations handling sensitive data — including a recent case where the personal data of nearly half a million Japanese citizens was put in a compromising position when the […]


Cloud security, Security

Most educational institutions store sensitive data in the cloud. Is it safe?

September 9, 2022

Via: Help Net Security

A Netwrix survey revealed that 47% of educational institutions suffered a cyberattack on their cloud infrastructure within the last 12 months. For 27% of them, incidents in the cloud were associated with unplanned expenses to fix security gaps. “Educational institutions […]


Application security, Security

In-app browser security risks, and what to do about them

September 6, 2022

Via: CSO Online

In-app browsers can pose significant security risks to businesses, with their tendency to track data a primary concern. This was highlighted in recent research which examined how browsers within apps like Facebook, Instagram and TikTok can be a data privacy […]


Threats & Malware, Vulnerabilities

Companies Still Exposing Sensitive Data via Known Salesforce Misconfiguration

August 10, 2021

Via: Security Week

While the misconfiguration has been known since at least last year and Salesforce has taken steps to prevent incidents, data security company Varonis says it’s still seeing many affected organizations. Varonis believes thousands of companies could still be vulnerable. Salesforce […]


Network security, Security

Avoiding the snags and snares in data breach reporting: What CISOs need to know

October 20, 2020

Via: CSO Online

Failing to report sensitive data breaches to US regulatory and law enforcement agencies just got more dangerous and confusing for CISOs and their organizations. If that failure is seen as a coverup, such as paying ransoms for retrieving sensitive data, […]


Threats & Malware, Vulnerabilities

Researchers Expose a New Vulnerability in Intel’s CPUs

June 12, 2020

Via: Wired

FOR THE PAST two years, modern CPUs—particularly those made by Intel—have been under siege by an unending series of attacks that make it possible for highly skilled attackers to pluck passwords, encryption keys, and other secrets out of silicon-resident memory. […]


Data loss, Network security, Threats & Malware, Vulnerabilities

42% of used drives sold on eBay hold sensitive data, researchers find

April 30, 2019

Via: Hot for Security

Selling your old hard drive on eBay may sound like a good way to squeeze a few extra bucks from unused hardware, but not if you don’t erase the data properly. A combined team of data recovery experts from Blanco […]


Cloud security

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

July 31, 2017

Via: Security Intelligence

Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, […]


Cloud security, Data loss

Cloudflare Bug Leaks Sensitive Data

February 27, 2017

Via: Threat Post

The Cloudflare content delivery network for months has been leaking customer data, everything from private messages to encryption keys and credentials belonging to users of some of the Internet’s biggest properties. The vulnerability has been addressed, Cloudflare CTO John Graham-Cumming […]


Network security

See Through the DDoS Smoke-Screen to Protect Sensitive Data

January 27, 2017

Via: Radware Blog

DDoS attacks can be costly and risky. TierPoint is witnessing a growing trend of using such attacks as the means to another, potentially more devastating, end: stealing sensitive data. Call this new breed of attack the “DDDoS”—deceptive distributed denial-of-service. With […]


Data loss

Most used drives sold on eBay hold personal information

June 30, 2016

Via: Help Net Security

E-commerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives purchased from eBay and Craigslist in the first quarter of 2016, Blancco Technology Group […]


Data loss

The next wave of smart Data Loss Prevention solutions

May 26, 2016

Via: Help Net Security

Data Loss Prevention has evolved beautifully in the last few years. The measure of control that DLP now provides is extremely powerful, and helps organizations from all sectors and of all sizes minimize the risk of data theft and loss, […]


Data loss

Who’s on First? Creating a Data Security Roster to Safeguard Data From Insiders

March 21, 2016

Via: Security Intelligence

Major League Baseball’s spring training will wrap up in a matter of weeks, and baseball stadiums everywhere are getting ready for opening day — you might even be able to smell the peanuts already. But when it comes to your […]


Malware

Ransomware infects the health care sector

February 19, 2016

Via: TrendMicro Blog

By now, ransomware isn’t anything new – these attacks have been capturing headlines for several years, particularly when high-profile targets including enterprises or law enforcement agencies are victims. However, a ransomware infection poses a unique set of challenges when it takes place […]


Access control, Hacker

The threat of shoulder surfing should not be underestimated

January 14, 2016

Via: CSO Online

I prefer the use of shoulder surfing over visual hacking, however it is a highly critical issue for security practitioners. First, lets examine the straightforward claim of teamwork and collaboration. The column assumes that everyone inside a company is entitled […]


Data loss, Network security

DDoS attacks are more than disruptions to service

December 3, 2015

Via: CSO Online

Distributed denial-of-service attacks have increased in complexity so that they are no longer just an annoyance causing a disruption in service. Criminals are using these attacks as a distraction while targeting sensitive data, leaving enterprises to pay for lost business […]


Cloud security

Lack of visibility and security concerns hinder cloud adoption

December 2, 2015

Via: Help Net Security

When it comes to migrating to the cloud, 65% of companies are concerned with security and 40% worry about their loss of physical control over data in the cloud. In particular, 69% of companies are afraid that migration to the […]


Access control, Editorial, Security

Air gapped computers – security issues

August 12, 2015

Via: Russel Edwards

The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized only at a cryptographic level. Used in order to […]