Cost of a Data Breach: Retail Costs, Risks and More To Know

E-commerce sales grew by nearly one-third in 2020, in large part due to the pandemic. Meanwhile, retail data breaches grew even more prevalent and costly. Retailers need to know not just the cost of a data breach, but the risks and challenges involved with one. This can help IT security professionals and business owners protect […]

The post Cost of a Data Breach: Retail Costs, Risks and More To Know appeared first on Security Intelligence.

Continue reading Cost of a Data Breach: Retail Costs, Risks and More To Know

Data Security: How Data Activity Monitoring Protects Against Ransomware

Ransomware is an attack on your data. Can you say that your approach to preventing ransomware is focused on data? Organizations are becoming more aware of the chaos that ransomware can create — to the tune of $4.62 million in escalation, notification, lost business and response costs, according to the 2021 Cost of a Data […]

The post Data Security: How Data Activity Monitoring Protects Against Ransomware appeared first on Security Intelligence.

Continue reading Data Security: How Data Activity Monitoring Protects Against Ransomware

Exploring the Costs, Risks and Causes of a Government Data Breach

In nearly every part of the world, people associate the word ‘government’ with order. Government services bring societal order, economic stability and security at all levels. However, the past decade of data breaches has challenged this. Federal and local governments battle worldwide breaches and cyber attacks. Data security flaws have been so pervasive in public […]

The post Exploring the Costs, Risks and Causes of a Government Data Breach appeared first on Security Intelligence.

Continue reading Exploring the Costs, Risks and Causes of a Government Data Breach

What Happens to Information After a Data Breach?

We’ve grown accustomed to it by now — a few million accounts broken into here, another hundred million there. After a company data breach, what happens to all the data? Where does it go? And how does this impact your vulnerability analysis? In June 2020, stolen Facebook user data suddenly popped up for sale on […]

The post What Happens to Information After a Data Breach? appeared first on Security Intelligence.

Continue reading What Happens to Information After a Data Breach?

CISA Names 3 ‘Exceptionally Dangerous’ Behaviors to Avoid

In terms of database security, any bad practice is dangerous. Still, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently deemed some behavior as “exceptionally risky.” Are your teams engaged in these high-risk practices? What can you do to mitigate the risk of a data breach? As per CISA, “The presence of these Bad Practices […]

The post CISA Names 3 ‘Exceptionally Dangerous’ Behaviors to Avoid appeared first on Security Intelligence.

Continue reading CISA Names 3 ‘Exceptionally Dangerous’ Behaviors to Avoid

Deploying Proven Data Security Tools to Combat the Rising Cost of a Data Breach

It can be hard to navigate which solutions really protect you from the effects of a data breach. Take a look at defending against data breaches by the numbers. That way, you can focus on the modern data security approaches that make next year’s results more promising. According to the annual Cost of a Data […]

The post Deploying Proven Data Security Tools to Combat the Rising Cost of a Data Breach appeared first on Security Intelligence.

Continue reading Deploying Proven Data Security Tools to Combat the Rising Cost of a Data Breach

Data Poisoning: The Next Big Threat

Data poisoning against security software that uses artificial intelligence (AI) and machine learning (ML) is likely the next big cybersecurity risk. According to the RSA 2021 keynote presentation by Johannes Ullrich, dean of research of SANS Technology Institute, it’s a threat we should all keep an eye on. “One of the most basic threats when […]

The post Data Poisoning: The Next Big Threat appeared first on Security Intelligence.

Continue reading Data Poisoning: The Next Big Threat

Behavior Transparency: Where Application Security Meets Cyber Awareness

How can you tell when software is behaving strangely if you don’t know what the right behavior is? That’s an important question when it comes to threat actors. After all, attackers often hijack honest software, networks and systems for dishonest ends. To stop them with security tools, the first step must be to have great […]

The post Behavior Transparency: Where Application Security Meets Cyber Awareness appeared first on Security Intelligence.

Continue reading Behavior Transparency: Where Application Security Meets Cyber Awareness

What Does The Great Resignation Mean for Data Security?

You may not realize it yet, but we’re living through the latest zeitgeist. It’s the Great Resignation. You may have heard it being tossed around the media or witnessed it firsthand, or even been a part yourself. Either way, it’s happening across the United States. And it affects data security as much as it affects […]

The post What Does The Great Resignation Mean for Data Security? appeared first on Security Intelligence.

Continue reading What Does The Great Resignation Mean for Data Security?

How Data Discovery and Zero Trust Can Help Defend Against a Data Breach

As more companies start to use the cloud, the threat of a data breach and the rules and fines that go with it has only grown. Therefore, companies and agencies need to anticipate and adapt to their changing data and IT landscape. For that, a zero trust approach to data security and privacy might be […]

The post How Data Discovery and Zero Trust Can Help Defend Against a Data Breach appeared first on Security Intelligence.

Continue reading How Data Discovery and Zero Trust Can Help Defend Against a Data Breach