All Data Breach articles
-
WebinarHow Financial Services Companies Can Protect Themselves Against Financial Crime
Webinar produced by GRC World Forums in association with Exterro
-
NewsCloud data breaches caused mostly by human error
A report has identified human error as one of the main causes of cloud infrastructure data breaches.
-
NewsChatbot “prompt injection” risk issued by NCSC
Anxieties are now arising from the fact that chatbots interact with third-party applications and services, making them susceptible to malicious prompt injection.
-
NewsJapan’s cybersecurity data breach a stark reminder of global cyber risk
Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) has suffered a major cyberattack that went undetected for about nine months, potentially exposing sensitive data.
-
NewsMassive data breach from US software firm exposes millions globally
A significant cybersecurity breach originating from a single American software maker has left a trail of exposure across more than 600 organisations worldwide, raising concerns about data security and digital privacy.
-
WebinarWhy Healthcare Organizations Need Modern IAM Solutions
Webinar produced by GRC World Forums in association with ManageEngine
-
WebinarHow Financial Services Companies Can Protect Themselves Against Financial Crime
Webinar produced by GRC World Forums in association with Exterro
-
WebinarWhat Comes Next After A Data Breach
While the global average cost of a data breach has increased to $4.24 million, the total cost isn’t just in data loss alone.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
WebinarThe Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
AnalysisCash App Data Breach Exposes Over 8-Million Customers
Often when we think of data breaches, we think of external cyber threat actors utilizing ransomware to make a profit. We rarely think that our own employees could be the culprit of a massive data breach.
-
ebookExecutive Summary: ICS/OT Cybersecurity Year In Review 2021
Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 ICS/OT Year in Review.
-
WebinarConfident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
NewsHacker deletes 69K hospital patient files
San Juan Regional Medical Center in Farmington, New Mexico has begun notifying nearly 69,000 patients about a malware attack that exposed their personal health information.
-
NewsPacific City Bank confirms ransomware attack
Pacific City Bank, one of the largest Korean-American community banking service providers in America has confirmed that it was the victim of a ransomware attack.









