When Every Day is Cyber Monday, Attackers Can Score Big
Back in the seemingly footloose and fancy-free pre-Covid-19 age, shopping holidays were also rooted in pre-New Normal reality. But since last spring, our offline and online lives have further blurred, and merchant focus on one-off ... Read More
Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks
Every year, the security industry at large eagerly awaits the release of the Verizon Data Breach Investigations Report (DBIR). Now in its thirteenth year, the DBIR is widely considered to be one of the industry’s ... Read More
Data Privacy Day: Data Protection Lessons from the 2010s
Today is “Data Privacy Day” – and while it seems like there is a day for nearly everything we hold dear (hello national grilled cheese day!), this particular date commemorates the 1981 signing of the ... Read More
With 5G and IoT, It’s a New Day with New Risks
Connected devices and smart technology — often referred to collectively as the Internet of Things (IoT) — are present in every aspect of our lives today: at home, school, work and on the go. Constant... The post With 5G and IoT, It’s a New Day with New Risks appeared first ... Read More
Ecuador Data Breach the Result of Cloud Vulnerability
A recently discovered breach exposed data on almost every one of Ecuador’s approximately 17 million citizens, including 6.7 million children. Aside from the scale, this breach is making front-page news for the sheer breadth of... The post Ecuador Data Breach the Result of Cloud Vulnerability appeared first on CyberArk ... Read More
Supply Chain Meets Blockchain: A Perfect Match
Editor’s Note: In late 2018, CyberArk published five cybersecurity predictions for 2019. This deep-dive blog series will examine each prediction in detail to help organizations stay on top of emerging threats and out-innovate and out-maneuver cyber attackers.... The post Supply Chain Meets Blockchain: A Perfect Match appeared first on CyberArk ... Read More
Just-in-Time Access Just How You Want It
Part one of this series discussed the history and backstory of just-in-time, its history in the 1970s with Toyota manufacturing plants and how this methodology has made its way into cybersecurity in the form of... The post Just-in-Time Access Just How You Want It appeared first on CyberArk ... Read More
Biometric Authentication – Our ‘Unique Human Identities’ Under Attack
Editor’s Note: In late 2018, CyberArk published five cybersecurity predictions for 2019. This deep-dive blog series will examine each prediction in detail to help organizations stay on top of emerging threats and out-innovate and out-maneuver... The post Biometric Authentication – Our ‘Unique Human Identities’ Under Attack appeared first on CyberArk ... Read More
GDPR Breach Notification By Country: 59,000 Incidents Reported
In May, it will be a year since the enforcement of the EU GDPR began. In the midst of continued and ever growing confusion within the EU caused by the Brexit process, a recent report... The post GDPR Breach Notification By Country: 59,000 Incidents Reported appeared first on CyberArk ... Read More

