Data breaches - Tagged - Security Boulevard

Dependence on Log Data | The Limitations, Hidden Costs, and Additive Nature of SIEM

ou may be surprised to learn that log data is proprietary to each security platform vendor. There is no standard format or even a standard labeling mechanism. Your data only has context ...
web application security banner

What are Serialization Attacks and How to Prevent Them?

Serialization attacks are lesser-known threat vectors than other sensationalized threat vectors. They are uncommon too as they require a greater level of expertise for attacks to successfully execute. Serialization vulnerabilities,. The post ...

Busting the Myths Surrounding Password-Based Security

People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove ...

10 Eye-Opening Data Breach Statistics (and How You Can Better Protect Your Network)

While we’re seeing more data breaches than in years past, being proactive can make an enormous difference. Head-in-sand is not the optimal position for any modern organization with a network-based infrastructure. Education ...
Malicious Life Podcast: Ten Years On - Are We Doing Security Right?

Malicious Life Podcast: Ten Years On – Are We Doing Security Right?

The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client ...
T-Mobile: Breach Exposed SSN/DOB of 40M+ People

T-Mobile: Breach Exposed SSN/DOB of 40M+ People

T-Mobile warned Monday that a data breach has exposed the names, date of birth, Social Security number and driver's license/ID information of more than 40 million current, former or prospective customers. The ...
T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge

T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge

Reports came out this week that T-Mobile had suffered a data breach. T-Mobile claims that the leak has been sealed. They deserve credit for responding quickly, but for some the damage may ...
T-Mobile Investigating Claims of Massive Data Breach

T-Mobile Investigating Claims of Massive Data Breach

Communications giant T-Mobile said today it is investigating the extent of a data breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including ...
web application security banner

Why Would Someone Hack My Website?

Website hacking has become very common, regardless of the size, scale, or nature of the organizations. Hackers are stealing 75 records per second and creating 300,000 new pieces of malware. The post ...
What the Growing Costs of a Data Breach Means for the Business

What the Growing Costs of a Data Breach Means for the Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to ...

Techstrong Group