How Can Cybersecurity Professionals Account for Vulnerabilities in Fleet Data?

Fleet operations today revolve around data. Telematics systems, connected cars, and similar IoT systems provide fleet managers with a wealth of information, but this connectivity also raises security concerns. As data breach ...
The Optus Breach: How Bad Code Keeps Happening to Good Companies

The Optus Breach: How Bad Code Keeps Happening to Good Companies

| | Cybersecurity, data, Finance, security
First, let me be clear that I have no insider knowledge. This is my best guess at what occurred, based on publicly available information here and others indicated in references section below.On Thursday ...

What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide

Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace ...

How to Correctly Classify Your Data in 2022

Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless ...
A10 DDoS AI machine learning

Battle in the Cloud: Preventing DDoS Attacks

Distributed denial-of-service (DDoS) attacks pose significant security risks for businesses. One minute, your user is happily browsing your site; the next, your site is flooded with a tsunami of traffic, sending you ...
Security Boulevard
PII Microsoft Koverse data protection impact assessment DPIA Dell AWS data protection cybersecurity

Common Challenges When Handling PII Data

Personally identifiable information (PII) is information that can be used to distinguish or trace an individual’s identity. Understandably, if compromised, such sensitive information may be used for identity theft, fraud and other ...
Security Boulevard

5 Things We Learned from The Definitive Guide to Data Loss Prevention (DLP)

In the context of hybrid work, the threat of data loss is rampant. Cybersecurity systems that were once designed to operate within the confines of a network perimeter have become obsolete, with ...
LockBit ransomware Connectwise

How to be Ransomware Ready in Four Steps

2021 was a breakout year for ransomware, growing 105% and exceeding 623.3 million attacks, according to SonicWall’s 2022 Cyber Threat Report. Additional research from Sophos showed that ransom payments increased to an ...
Security Boulevard
CISA security tools Microsoft 365 Google

Defense Vs. Control: The Optimal Approach to Cloud Security

A cloud environment is not a replica of an on-premises network or a data center. Unlike traditional data centers which have a rigid IT architecture blueprint, the cloud comes with flexibility that ...
Security Boulevard
encryption enterprise encryption

How Encryption Helps Restore Cloud Security Integrity

Data is everywhere and anywhere and, as a result, data management is out of control. Once a user or customer has signed up for a service or purchased a product, they usually ...
Security Boulevard