WSJ: Techniques To Avoid Inflaming Breach Communication

 

WSJ: Techniques To Avoid Inflaming Breach Communication

By Kate Fazzini

How corporate security teams talk to each other and to executives during the early stages of a breach can sometimes make the situation worse.

Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

 

Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

Healthcare is now the most vulnerable industry to data breaches, with 328 breaches in 2017 alone (accounting for 60% percent of all breaches last year). The total estimated cost of these breaches reached $1.2 billion. 

Identity 101: Why Two-Factor Authentication Is Not Enough

 

Identity 101: Why Two-Factor Authentication Is Not Enough

Keith Graham, Chief Technology Officer, SecureAuth, examines some attacks which exploit today's trade-off for easy user experience.

5 Practical Steps for GDPR Preparation

 

5 Practical Steps for GDPR Preparation

This year the European Commission is taking a major step to standardise online privacy protections for its citizens. The General Data Protection Regulation (GDPR) requires businesses to comply with new rules for collecting, sharing, and protecting personal data within the borders of the European Union (EU) or when exporting information internationally.

The Attraction of the Single Tier Approach

The Attraction of the Single Tier Approach

Crowdstrike and SecureAuth are both security vendors and have both recently taken the decision to move away from distribution

One of the most highly populated areas in the market is the security world with established and start-up vendors jostling to be the chosen technology that will help keep customers secure.

The volume of players has put some strain on distribution because it was inundated with potential suppliers and given the task of doing sue diligence on numerous firms claiming to be offering the next big thing.

Over 1.1m E-Mail Addresses of Top UK Law Firms Found Dumped on Dark Web

Over 1.1m E-Mail Addresses of Top UK Law Firms Found Dumped on Dark Web

Over a million stolen e-mail addresses belonging to top 500 law firms in the UK were found dumped on the Dark Web, including 80,000 credentials stolen from select Magic Circle firms.

Stolen credentials found on the Dark Web were obtained by hackers after compromising third-party sites like LinkedIn or Dropbox where employees posted their e-mail addresses.

TechRepublic: Will the White House’s Cybersecurity Policies Protect Business?

Will the White House's Cybersecurity Policies Protect Business?

Dan Patterson of TechRepublic talks to Core Threat Research Manager, Willis McDonald, about the VEP; what it means, the implications, and if the policies will protect businesses.

TechRepublic: What are zero day exploits?

Zero day exploits: What they are and how they work

Core Security's Bobby Kuzma provided this quick explainer on zero day exploits and why businesses should be concerned about them.

 

Pages