What is the cost of an insider data breach?

As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by employees as a normal course of everyday business or as they prepare for their n… Continue reading What is the cost of an insider data breach?

1 in 5 companies fail PCI compliance assessments of their infrastructure

According to a recent poll by SentryBay, the infrastructure of over 21% of surveyed companies has failed key PCI compliance assessments, designed to assist them to maintain high security standards when processing customer card payments. In addition, a … Continue reading 1 in 5 companies fail PCI compliance assessments of their infrastructure

Phishing, Ransomware Driving Wave of Data Breaches

Data compromises have increased every month this year except May. If that trend continues, or even if there is only an average of 141 new compromises per month for the next six months, the total will still exceed the previous high of 1,632 breaches se… Continue reading Phishing, Ransomware Driving Wave of Data Breaches

How to Prepare for a Cyberattack

Preventing cyberattacks isn’t easy. If it were, there wouldn’t be a continuous stream of ransomware attacks dominating news feeds, nor would the president of the United States feel compelled to issue executive orders on cybersecurity or to declare tha… Continue reading How to Prepare for a Cyberattack

Health insurers facing growing risk of customer data theft

The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the expansion of remote healthcare delivery and growing digitization of insurance transac… Continue reading Health insurers facing growing risk of customer data theft

Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play

There’s a whole lot going on over at the Google Play store. First, Lookout researchers found 170 apps used in cryptomining scams that have snared more than 93,000 victims. Actually, only 25 were available for download on Google Play; the vast majority… Continue reading Cryptomining Scam Apps, ‘Stealer’ Trojans Culled from Google Play

Digital Habits During Pandemic Have Lasting Impact

The unexpected global pandemic left the world scrambling to maintain their daily activities and work as best they could. With stay-at-home orders that lasted for months on end—and some countries currently instituting another wave of lockdowns—most peo… Continue reading Digital Habits During Pandemic Have Lasting Impact

Reevaluating Your Breach Prevention Strategy

Do you deploy security products to protect your organization against data breaches as part of your infrastructure cybersecurity strategy? If so, it’s important to ensure there are no critical gaps in your security stack. If you consider the cate… Continue reading Reevaluating Your Breach Prevention Strategy

What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data rights clash with international government surveillance efforts. This friction… Continue reading What you need to know about transatlantic data transfers

62% of consumers believe hyperscale computing will have a positive impact over the next five years

A majority of consumers believe hyperconnectivity driven by hyperscale computing will positively impact them within five years, according to a report from Cadence Design Systems. The survey was conducted to determine consumer awareness and impressions … Continue reading 62% of consumers believe hyperscale computing will have a positive impact over the next five years