All Security Breaches and Attacks articles – Page 3
-
VideoThird Party Risk Management: Cybersecurity Expertise into Board Governance and a Company’s Digital Defense
As companies the world over grapple with the rising cyber security threat, is it now time to have a director in charge of cybersecurity in the boardroom? If so, how do you ensure you find the right person.
-
VideoWomen and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
VideoHow to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
NewsUS fertility clinic suffers data breach
Information on about 38,000 patients of Reproductive Biology Associates (RBA) and affiliate My Egg Bank North America have been compromised in a ransomware attack.
-
NewsAir India confirms breach hit 4.5 million passengers
Months after the air transport data giant SITA reported a data breach, Air India has confirmed that the cyber attack in February has compromised the personal data of 4.5 million of its customers.
-
BlogThe key theme: third party risk management
Rapid shifts in the way we structure our IT infrastructrues have put a spotlight on third party risk management, which is a key theme of PrivSec Global next month. Emma Osborn explains why the issue is so important for privacy and security.
-
NewsArdagh hit by cyber-attack
Supply chain operations and product delivery at Ardagh have been impacted by what the global packaging giant described as a cyber security incident.
-
WebinarBeyond the Perimeter: A New Data-Centric Model for Breach Preparedness and Rapid Response
For decades, technology leaders have focused on building a strong perimeter around their networks. But that approach to cybersecurity is no longer sustainable or effective: Globally distributed teams and supply chains have dramatically changed the way organizations create, store, and share data.
-
WebinarA Post-Brexit Perspective: Managing Personal Data Breaches
Brexit will have a profound effect on how UK businesses address their privacy programs. Faced with new challenges for maintaining data transfers across Europe, organizations need a proactive plan in place to manage personal data breaches. Because of this, organizations are asking questions like when can you rely on the one-stop shop mechanism?
-
NewsBiden reportedly planning to oblige software companies to disclose cyber breaches
Many software vendors would have to notify their US government customers when the companies suffer a cyber security breach, according to an executive order reportedly being considered by President Joe Biden.
-
NewsSecond North American university hacked
Personally identifiable information of students and others connected with the Simon Fraser University (SFU) in western Canada have leaked in a cyberattack.
-
FeaturePreparing for the ‘new normal’ in cyber security
The global coronavirus pandemic has added an enormous strain on employees’ ability to work remotely.
-
FeatureAddressing Privacy and Data Security Implications of the Coronavirus
COVID-19 arrives just as the first omnibus privacy statute in the United States, the CCPA became effective. Since its January 1 effective date, we continue to wait for finalization of the CCPA regulations and enforcement that was slated for July 1.
- Previous Page
- Page1
- Page2
- Page3
- Next Page



