Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown territory to gain market share. Now, 26 years later, cyber insur… Continue reading Keeping up with the demands of the cyber insurance market

Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data

These open directories could leak sensitive data, intellectual property or technical data and let an attacker compromise the entire system. Follow these security best practices for open directories. Continue reading Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data

Vulnerability resolution enhanced by integrations

Why speed is of the essence in today’s cybersecurity landscape? How are you quickly achieving vulnerability resolution? Identifying vulnerabilities should be part of the daily process within an organization. It’s an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make […]

The post Vulnerability resolution enhanced by integrations appeared first on Security Intelligence.

Continue reading Vulnerability resolution enhanced by integrations

Retailers Are Rapidly Scaling Surveillance of Australian Consumers — Why This Is a Red Flag

Australian retailers are rolling out mass surveillance solutions to combat shoplifting, but a poor regulatory environment could mean high risks associated with data security and privacy. Continue reading Retailers Are Rapidly Scaling Surveillance of Australian Consumers — Why This Is a Red Flag

What is a Database Administrator and What Do They Do All Day?

A DBA is a technician skilled in SQL and very large databases who is responsible for managing database software, backup and recovery processes, data security, and storage and capacity planning. Continue reading What is a Database Administrator and What Do They Do All Day?

Microsoft AI Researchers Accidentally Leaked 38TB of Sensitive Data

Cybersecurity researchers have uncovered a 38TB storage bucket containing private data inadvertently leaked by a Microsoft employee. The breach, attributed to a misconfigured GitHub repository within Microsoft’s AI research team, exposed sensitive information including passwords, secret keys, and internal messages. In a report published this week, Wiz researchers explained that they discovered a misconfigured GitHub…

The post Microsoft AI Researchers Accidentally Leaked 38TB of Sensitive Data appeared first on Petri IT Knowledgebase.

Continue reading Microsoft AI Researchers Accidentally Leaked 38TB of Sensitive Data

Balancing budget and system security: Approaches to risk tolerance

Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty of learning moments. Learning what went wrong and why can be a good sanity c… Continue reading Balancing budget and system security: Approaches to risk tolerance

Organizations are racing against time to meet the PCI DSS 4.0 deadline

Payment data security concerns remain widespread as organizations undertake significant lift to meet the PCI DSS 4.0 deadline, according to Bluefin. 94% of survey respondents said they have significant or very significant concerns pertaining to payment… Continue reading Organizations are racing against time to meet the PCI DSS 4.0 deadline

The hidden dangers of low-value data

In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal the crown jewels. Desp… Continue reading The hidden dangers of low-value data