The 16 worst data security breaches of the 21st century
CIO | Data Breach
by
2y ago
Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 16 breaches and their overall impact on customers or employees ..read more
Visit website
Lessons from the SolarWinds attack on securing the software supply chain
CIO | Data Breach
by
3y ago
The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high -- allowing them to stay in stealth mode -- they also understood the supply chain. Join us to learn how improved identity management and governance surrounding software components, along with workload runtime protection, are critical strategies in guarding against attacks like SolarWinds ..read more
Visit website
Best enterprise-grade password managers 2018
CIO | Data Breach
by Charlotte Trueman
4y ago
Cyber attacks are on the rise and the ASEAN region is no less immune to this ever-growing threat than the rest of the world. As the digital economy of the bloc continues to flourish, threat actors are seeing the potential in both targeting the region and using it as a launch pad for large-scale cyber attacks. Back in May, hackers gained access to the Wendy’s Philippines website, compromising 82,150 records belonging to customers and job applicants. The information included names, addresses, passwords, payment method and transaction details. Not to be outdone, Thailand’s second biggest mobile n ..read more
Visit website
Fighting holiday fraud: 5 ways ecommerce retailers can boost security
CIO | Data Breach
by Sharon Goldman
5y ago
Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers ..read more
Visit website
IDG Contributor Network: Poor cyber resilience: an organization’s Achilles' heel
CIO | Data Breach
by Marc Wilczek
5y ago
Digital advances are recreating global business through ongoing advances in artificial intelligence, the Internet of Things (IoT), data availability, blockchain, and other key areas. The rapidity with which these technologies are evolving and reconfiguring traditional business models keeps increasing. Meanwhile, cyber-threats seem to develop just as fast, if not faster. Today, cyber-risk is about far more than the data breaches and privacy concerns we’ve all heard about in the news. Now it involves maddeningly clever schemes that can disrupt entire companies, industries, supply chains, and nat ..read more
Visit website
IDG Contributor Network: Have you dusted off your incident response plan?
CIO | Data Breach
by Brian E. Thomas
5y ago
As a CIO or senior technology leader for your organization, it is important that you are the champion for ensuring the company’s security posture is solid. You may have a CISO at your organization, depending on the size of the company and your CISO may be very much on top of this. However, it is key that your incident response plan is solid, tested, trained and socialized with all those that would be involved when your plan is activated.  Every week (more like daily) we see headlines about a financial institution, local government or large school system that is hacked or has become the latest ..read more
Visit website
IDG Contributor Network: How much cybersecurity funding is enough – is it a bottomless pit?
CIO | Data Breach
by Michael Gabriel
5y ago
I was the corporate technology representative for an information risk committee meeting attended by senior level executives from finance, HR, legal, physical security, internal audit and our external auditors. External audit conveyed that they needed to brief the board on the potential cybersecurity threat. The problem was if this was conveyed before we had some response, all it would do is create concern and a probable fire drill approach that would not be productive. Questions were raised around how to best convey our overall corporate cybersecurity status as well as across each division. Th ..read more
Visit website
IDG Contributor Network: Almost all cyberattacks in 2018 were preventable
CIO | Data Breach
by Marc Wilczek
5y ago
In 2018, over 2 million cyber incidents racked up a minimum of $45 billion in losses, according to a recently released report based on statistics gathered from organizations that track data breaches. Jeff Wilbur, technical director of the Internet Society's Online Trust Alliance (OTA) – which recently published its 2018 Cyber Incident & Breach Trends Report – says it’s hard to get a handle on the full extent of the cyber-incident landscape. “Everyone’s viewing it from their own lens,” he says.  The OTA published its first edition of this report 11 years ago. Initially, it focused only on d ..read more
Visit website
DJI's bounty problems and video surveillance programs | Salted Hash Ep 13
CIO | Data Breach
by
5y ago
Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid ..read more
Visit website
IDG Contributor Network: Is a shortage of C-suite support getting in the way of corporate cyber-resilience?
CIO | Data Breach
by Marc Wilczek
5y ago
We’ve all heard news reports about distributed denial of service (DDoS) attacks that hobble IT infrastructure and take an entire business offline, or data breaches that expose vast amounts of sensitive customer information to invisible cyber-criminals. Due to the emergence of the IoT with billions of endpoints, increasing usage of cloud computing, and large-scale data silos, the utilization of digital technology inevitably increases the cyber-risk posture of an organization. Nevertheless, the 2019 Cost of a Data Breach Study (registration required), conducted annually for IBM by the Ponemon In ..read more
Visit website

Follow CIO | Data Breach on FeedSpot

Continue with Google
Continue with Apple
OR