Cost of a data breach: The industrial sector

Industrial organizations recently received a report card on their performance regarding data breach costs. And there’s plenty of room for improvement. According to the 2024 IBM Cost of a Data Breach (CODB) report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the […]

The post Cost of a data breach: The industrial sector appeared first on Security Intelligence.

Continue reading Cost of a data breach: The industrial sector

Cost of a data breach 2024: Financial industry

According to the IBM Cost of a Data Breach 2024 report, the average global breach cost has reached $4.88 million — a significant increase over last year’s $4.45 million and the biggest jump since the pandemic. For financial industry enterprises, costs are even higher. Companies now spend $6.08 million dealing with data breaches, which is […]

The post Cost of a data breach 2024: Financial industry appeared first on Security Intelligence.

Continue reading Cost of a data breach 2024: Financial industry

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography.
The post Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanati… Continue reading Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions

In modern security parlance, ‘immutable’ has three primary associations: immutable servers, immutable backup, and immutable data.
The post Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions appeared first on Securit… Continue reading Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions

Cost of a data breach: The healthcare industry

Cyberattacks grow every year in sophistication and frequency, and the cost of data breaches continues to rise with them. A new report by IBM and the Ponemon Institute, the 2024 Cost of Data Breach Study, details the financial impacts of attacks across multiple industries. The global average cost of a data breach reached an all-time […]

The post Cost of a data breach: The healthcare industry appeared first on Security Intelligence.

Continue reading Cost of a data breach: The healthcare industry

Scaling data security solutions: What you need to know

In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that effective data visibility involves discovering, classifying, and contextualizin… Continue reading Scaling data security solutions: What you need to know

Surging data breach disruption drives costs to record highs

Security teams are getting better at detecting and responding to breach incursions, but attackers are inflicting greater pain on organizations’ bottom lines. IBM’s recent Cost of a Data Breach Report 2024 found the global average breach hit a record $4.88 million. That’s a 10% increase from 2023 and the largest spike since the pandemic. While […]

The post Surging data breach disruption drives costs to record highs appeared first on Security Intelligence.

Continue reading Surging data breach disruption drives costs to record highs

Data Wallets Using the Solid Protocol

I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership. This week, we announced a digital wallet based on the Solid architecture.

Details are here, but basically a digital wallet is a repository for personal data and documents. Right now, there are hundreds of different wallets, but no standard. We think designing a wallet around Solid makes sense for lots of reasons. A wallet is more than a data store—data in wallets is for using and sharing. That requires interoperability, which is what you get from an open standard. It also requires fine-grained permissions and robust security, and that’s what the Solid protocols provide…

Continue reading Data Wallets Using the Solid Protocol

Cloud security threats CISOs need to know about

In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data breaches, misconfiguration, insider threats, advanced p… Continue reading Cloud security threats CISOs need to know about