What Types of Data Breaches do you Need to Know About in 2023?

What Types of Data Breaches do you Need to Know About in 2023?

| | Breach
Ensure you're aware of these common types of data breaches to stand the best chance of protecting your valuable information ...

The Cost of a Data Breach Reaches an All-Time High

Like most things in life, the cost of a data breach has gone up, reaching an all-time high of $4.45 million—a 2.3% increase over last year’s cost, according to IBM’s newly-released Cost ...
New SEC Rules Mandate Cybersecurity Transparency and Oversight

New SEC Rules Mandate Cybersecurity Transparency and Oversight

 The new SEC Rules establish a framework that requires rapid disclosure of material cybersecurity incidents (4 days), companies will need to be able to explain their cybersecurity posture to manage risks, and ...
Delayed Reporting of HCA Healthcare Data Breach

Delayed Reporting of HCA Healthcare Data Breach

The recent HCA Healthcare data breach of 11 million patients’ data is shaping up to be another ugly incident where a company did not promptly communicate with its customers. HCA Healthcare is ...
API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

How Audits + Testing = Long-Term Savings

Compliance audits and penetration testing play an important role in assessing, correcting and strengthening an organization’s security configuration ...
Security Boulevard
John Oliver

Reddit Ransomware Raid Redux: BlackCat/ALPHV Demands $4.5M

And now, this: John-Oliver-pics protest won’t change Reddit policy, but will ransom demand work? ...
Security Boulevard
passwordless, passwordless authentication, future, passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords

Passkeys Can Make Passwords a Thing of the Past

We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our ...
Security Boulevard

Cyberattack Stigma: How Delayed Reporting Causes More Damage

| | Breach
Cybersecurity leaders must detect and respond to successful attacks in ways that minimize overall damage to the organization itself. This often leads to delayed reporting that causes more damage than the attack ...
CISA vulnerability cybersecurity Atlassian CISA

Twitter Presses GitHub to Turn Over User Who Leaked Source Code

When Twitter joined the ranks of tech companies whose source code leaked online, it was met with little surprise and a whole lot of unease over what the leak might mean for ...
Security Boulevard
AI vulnerability

CrowdStrike Report Maps Changes to Cybersecurity Landscape

A report published by CrowdStrike today highlighted how the cybersecurity threat landscape has shifted in the last year, with 71% of attacks detected not involving malware. In fact, the number of interactive ...
Security Boulevard