Over 202 Million Chinese Job Seekers’ Details Exposed On the Internet

Cybersecurity researcher has discovered online a massive database containing records of more than 202 million Chinese citizens that remained accessible to anyone on the Internet without authentication until last week.

The unprotected 854.8 gigabytes o… Continue reading Over 202 Million Chinese Job Seekers’ Details Exposed On the Internet

Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.

The post Your Security Strategy Is Only as Strong as Your Cyber Hygiene appeared first on Security Intelligence.

Continue reading Your Security Strategy Is Only as Strong as Your Cyber Hygiene

IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

IBM X-Force’s top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.

The post IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape appeared first on Security Intelligence.

Continue reading IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

Cloud Security With a Chance of Data Breaches

Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.

The post Cloud Security With a Chance of Data Breaches appeared first on Security Intelligence.

Continue reading Cloud Security With a Chance of Data Breaches

30% of healthcare databases are exposed online

Despite the fact that electronic health records (EHR) contain extremely sensitive information about individuals, it is shockingly easy for malicious actors to get their hands on them, Intsights security researchers have discovered. It took them some 90… Continue reading 30% of healthcare databases are exposed online

Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data

As data becomes more fluid, dynamic and distributed, so do the challenges around protecting it. Unlike traditional data stores, there is little to no control of unstructured data.

The post Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data appeared first on Security Intelligence.

Continue reading Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data

Babysitting app suffers ‘temporary data breach’ of 93,000 users

Babysitting-booking app Sitter “temporarily” exposed the personal data of 93,000 account holders, according to a researcher who recently discovered the trove of data using the Shodan Internet of Things (IoT) search engine. Continue reading Babysitting app suffers ‘temporary data breach’ of 93,000 users

Building a Secure Cloud Data Lake with AWS, Protegrity and Talend

The Rise of the Cloud Data Lake By now, you already know that cloud computing is rapidly changing the landscape of IT and brings many business benefits.  The question is how do you balance the promise of cloud computing with concerns over the eros… Continue reading Building a Secure Cloud Data Lake with AWS, Protegrity and Talend

Critical vulnerability in Oracle Database, patch without delay!

Oracle is urging users to patch their Oracle Database installations to plug a critical security issue that can result in complete compromise of the Oracle Database and shell access to the underlying server. About the vulnerability (CVE-2018-3110) The v… Continue reading Critical vulnerability in Oracle Database, patch without delay!

A Quick-Start Introduction to Database Security: An Operational Approach

The recent SingHealth data breach incident exposed 1.5 million patients’ records. In the aftermath, the Cyber Security Agency of Singapore published a set of security measures aimed at improving the protection of Personally Identifiable Informati… Continue reading A Quick-Start Introduction to Database Security: An Operational Approach