brand trust

What’s Your Brand Promise? Customer Data, Cybersecurity, Compliance, And Trust

This article by Andre Bourque originally appeared in Benzinga. Portions are republished below. Dealing with data breaches is normal for big brands in the retail realm. You only need to scan the ...
Leave the Stone Age (and Spreadsheet) Behind

Leave the Stone Age (and Spreadsheet) Behind

People have been using spreadsheets for all sorts of applications, regardless of whether they were appropriate or not. Including using them for risk management. At the RSA Archer Summit 2018 this week, ...
Apple Hacked by a 16-year Old Hacker, Sensitive Data Stolen via the Attack

Apple Hacked by a 16-year Old Hacker, Sensitive Data Stolen via the Attack

Australian media reports that a 16 year-old hacker was able to hack into Apple servers and hijack sensitive data. The report came after a police investigation and the proceeding court actions. Detailed ...
Apple hacked by 16-year-old who “dreamed” of working for firm

Apple hacked by 16-year-old who “dreamed” of working for firm

An Australian teenager has admitted hacking into Apple’s internal network and stealing 90 GB worth of files. The 16-year-old, who cannot be named for legal reasons, has pleaded guilty to breaking into ...
Reconciling vulnerability responses within FIPS 140 security certifications

Reconciling vulnerability responses within FIPS 140 security certifications

| | Data Security
In this blog, I will present a new and efficient approach to reconciling security vulnerabilities and FIPS 140 security certifications,... The post Reconciling vulnerability responses within FIPS 140 security certifications appeared first ...

Hackers steal $13.5 million from Indian bank in global attack

Hackers planted malware on an automated teller machine (ATM) server belonging to an Indian bank as part of a criminal scheme which saw the theft of nearly 944 million rupees (US $13.5 ...
Sextortion Scams Using Redacted Phone Numbers to Demand Payment

Sextortion Scams Using Redacted Phone Numbers to Demand Payment

Sextortion scammers are now using potential targets’ redacted phone numbers in an attempt to trick them into submitting payment. Perhaps after having obtained a list that ties people’s phone numbers and email ...
™

6 most common cyber attacks

Cyber crime is at an all-time high. While organisations are trying to counter cyber attacks, criminal hackers are becoming more innovative and their attacks more sophisticated. What is a cyber attack? Cyber ...
User Privacy Threatens Security Defenses

Lack of User Privacy Threatens Security Defenses

Data threats come from three general fronts: individuals sharing too much information, data breaches and corporations selling increasingly granular customer data. Security professionals frequently sound warnings for the first two. The last ...
Security Boulevard
A Bug in Chrome Gives Bad Actors License to Play ‘20 Questions’ with Your Private Data

A Bug in Chrome Gives Bad Actors License to Play ‘20 Questions’ with Your Private Data

In a 2013 interview with The Telegraph, Eric Schmidt, then CEO of Google was quoted as saying: “You have to fight for your privacy or lose it.” Five years later, with the ...
Loading...