Seasonal Cybersecurity Risks

When Every Day is Cyber Monday, Attackers Can Score Big

Back in the seemingly footloose and fancy-free pre-Covid-19 age, shopping holidays were also rooted in pre-New Normal reality. But since last spring, our offline and online lives have further blurred, and merchant focus on one-off ... Read More
Credential Theft and Privileged Access Management

Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks

Every year, the security industry at large eagerly awaits the release of the Verizon Data Breach Investigations Report (DBIR). Now in its thirteenth year, the DBIR is widely considered to be one of the industry’s ... Read More
Data Privacy and Data Protection

Data Privacy Day: Data Protection Lessons from the 2010s

| | Security and Risk
Today is “Data Privacy Day” – and while it seems like there is a day for nearly everything we hold dear (hello national grilled cheese day!), this particular date commemorates the 1981 signing of the ... Read More

With 5G and IoT, It’s a New Day with New Risks

| | events, Security and Risk
Connected devices and smart technology — often referred to collectively as the Internet of Things (IoT) — are present in every aspect of our lives today: at home, school, work and on the go. Constant... The post With 5G and IoT, It’s a New Day with New Risks appeared first ... Read More

Ecuador Data Breach the Result of Cloud Vulnerability

| | Security and Risk
A recently discovered breach exposed data on almost every one of Ecuador’s approximately 17 million citizens, including 6.7 million children. Aside from the scale, this breach is making front-page news for the sheer breadth of... The post Ecuador Data Breach the Result of Cloud Vulnerability appeared first on CyberArk ... Read More

Supply Chain Meets Blockchain: A Perfect Match

| | Security and Risk
Editor’s Note: In late 2018, CyberArk published five cybersecurity predictions for 2019. This deep-dive blog series will examine each prediction in detail to help organizations stay on top of emerging threats and out-innovate and out-maneuver cyber attackers.... The post Supply Chain Meets Blockchain: A Perfect Match appeared first on CyberArk ... Read More

Just-in-Time Access Just How You Want It

Part one of this series discussed the history and backstory of just-in-time, its history in the 1970s with Toyota manufacturing plants and how this methodology has made its way into cybersecurity in the form of... The post Just-in-Time Access Just How You Want It appeared first on CyberArk ... Read More

Biometric Authentication – Our ‘Unique Human Identities’ Under Attack

Editor’s Note: In late 2018, CyberArk published five cybersecurity predictions for 2019. This deep-dive blog series will examine each prediction in detail to help organizations stay on top of emerging threats and out-innovate and out-maneuver... The post Biometric Authentication – Our ‘Unique Human Identities’ Under Attack appeared first on CyberArk ... Read More

GDPR Breach Notification By Country: 59,000 Incidents Reported

| | Reports
In May, it will be a year since the enforcement of the EU GDPR began. In the midst of continued and ever growing confusion within the EU caused by the Brexit process, a recent report... The post GDPR Breach Notification By Country: 59,000 Incidents Reported appeared first on CyberArk ... Read More