Tuesday, October 3, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • The MGM attack: What can be learned for your business
  • DEF CON 31 - Ben Nassi’s, Ofek Vayner’s ‘Video Based Cryptanalysis Extracting Keys From Power LEDs’
  • ReversingLabs A1000 Threat Analysis and Hunting Solution Update Drives SecOps Forward
  • AWS’ MadPot Honeypot Operation Corrals Threat Actors
  • Botmasters Unveiled: Exploring the Dual Role of Botnets in Today’s Digital Landscape
Data Security Security Bloggers Network Threats & Breaches 

Home » Cybersecurity » Data Security » Price vs. Cost: What the Stock Market Teaches Us about Data Breaches

SBN

Price vs. Cost: What the Stock Market Teaches Us about Data Breaches

by Tripwire Guest Authors on June 23, 2019

Normally, when you hear about stocks dropping, it’s due to some scandal or crisis. Market watchers will tell you that a range of elements can affect the value of a publicly traded company and cause stock prices to rise or fall. Consumer confidence is a major factor that influences a company’s reputation and perceived value.

AWS Builder Community Hub

What does that have to do with data breaches? A lot more than you might think.

What Does it Look Like? Anatomy of a Data Leak

Startups and SMBs undergoing a digital transformation aren’t the only ones having issues. Yahoo and Amazon have experienced record-breaking breaches that cost the companies millions of dollars and damaged their reputations. One of the hardest hit industries is health care, where millions of patient health records are infiltrated each day.

Target Breach Anatomy-v3
Source: Security Intelligence, Target Breach Anatomy

 

Would you trust a company that couldn’t keep your most sensitive information secure?

Neither would I, and it seems investors might have a problem with it too.

Share Price: How Low Can You Go?

We know that a small business can be devastated after a data breach even if it never becomes public knowledge, but what about the effects on larger publicly-traded enterprises, specifically when it comes to the underlying valuation of share price?

The UK-based research firm, Comparitech, performed an analysis of 24 companies. Each is publicly traded on the NYSE, and each experienced a data loss or exposure of at least one million public records. The companies analyzed included Apple, Equifax, Experian, Sony, Under Armor, Vodafone, T-Mobile, JP Morgan Chase, Dun & Bradstreet and other giants in their particular industries.

This report was released in August 2018 and extended backwards over a three-year period. Comparitech used the NASDAQ index as a benchmark for comparison against the individual NYSE companies.

The (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/stock-price-data-breach/

June 23, 2019June 24, 2019 Tripwire Guest Authors Data breach, IT Security and Data Protection, stock price
  • ← What’s New and Changing in the World of Vulnerability Management?
  • Citizen Engagement Helps Welsh Police Reduce Road Fatalities →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Wed 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Mon 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Tue 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Wed 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm
Thu 19

Managing Security Posture and Entitlements in the Cloud

October 19 @ 1:00 pm - 2:00 pm
Tue 24

When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig

October 24 @ 11:00 am - 12:00 pm
Tue 24

Reporting From the Pipeline: The State of Software Security in DevOps

October 24 @ 1:00 pm - 2:00 pm
Thu 26

How to Shift Left the Right Way

October 26 @ 3:00 pm - 4:00 pm
Mon 30

Zero-Trust

October 30 @ 1:00 pm - 2:00 pm
Tue 31

AppSec 101: Complete Application Security Across the SDLC

October 31 @ 11:00 am - 12:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
Cryptomining Attacks: The Stealth Threat to Your Cloud Security
Boards are Finally Taking Cybersecurity Seriously
Federal Shutdown Raises Cybersecurity Risks, Experts Warn
How to Talk So Your CISO Will Listen
DEF CON 31 – Joseph Gabay’s ‘Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing’
What You Need to Know About the libwebp Exploit
Methods To Protect Yourself From Identity Theft
2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs
Avoid libwebp Electron Woes On macOS With positron

Download Free eBook

7 Must-Read eBooks for Security Professionals

Industry Spotlight

AWS’ MadPot Honeypot Operation Corrals Threat Actors
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches 

AWS’ MadPot Honeypot Operation Corrals Threat Actors

October 3, 2023 Jeffrey Burt | 4 hours ago 0
Broken ARM: Mali Malware Pwns Phones
Analytics & Intelligence API Security Application Security AppSec Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight IOT IoT & ICS Security Malware Mobile Security Most Read This Week News Popular Post Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Broken ARM: Mali Malware Pwns Phones

October 3, 2023 Richi Jennings | 7 hours ago 0
Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
AI and Machine Learning in Security AI and ML in Security Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Regulatory Compliance Securing the Cloud Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts

October 2, 2023 Richi Jennings | Yesterday 0

Top Stories

Akamai Sees Surge of Cyberattacks Aimed at Financial Services
Analytics & Intelligence Application Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

October 3, 2023 Michael Vizard | 8 hours ago 0
Threat Groups Accelerating the Use of Dual Ransomware Attacks
Analytics & Intelligence Cybersecurity Data Security Featured Identity & Access Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Threat Groups Accelerating the Use of Dual Ransomware Attacks

October 2, 2023 Jeffrey Burt | Yesterday 0
Network Security Firm IronNet Ends Operations, Plans for Bankruptcy
Cloud Security Cybersecurity Data Security Featured Network Security News Security Boulevard (Original) Spotlight 

Network Security Firm IronNet Ends Operations, Plans for Bankruptcy

October 2, 2023 Jeffrey Burt | Yesterday 0

Security Humor

Randall Munroe’s XKCD ‘A Halloween Carol’

Randall Munroe’s XKCD ‘A Halloween Carol’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.