During the pandemic, two unusual and apparently unrelated trends have emerged - the rapid growth of the MSS (Managed Security Services) market and an increased demand for complex compliance management.
Read the latest CyberTheory Market report, Convergence of Compliance and MSSP/MDR results in a New Service...
Despite the soaring list of customers reporting data breaches tied to the May ransomware attack on Blackbaud - and numerous legal actions filed against the company - the fundraising software vendor recently told Wall Street that it expects cyber insurance to cover the bulk of its costs associated with the incident.
Reducing misconfigurations, monitoring malicious activity, and preventing unauthorized access are foundational activities necessary to ensure security and compliance of applications and data in the cloud. As criminals become more sophisticated in their abilities to exploit cloud misconfiguration vulnerabilities,...
Even before the pandemic set us on the road to a global recession, many banks were struggling to balance the polarising pressures of a changing world and keeping to business as usual.
The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.
In today's digital-first world, businesses subject to KYC requirements must find a way to create onboarding and authentication processes that achieve compliance and inhibit fraud, without alienating good customers. Time and again, research shows that overly cumbersome and time consuming processes turn good customers...
Now more than ever we continue to hear about cloud security lapses and high-profile breaches in the news. However, if you dig deeper into the details behind each of these breaches, you'd find that many vulnerabilities could have been avoided if the cloud environment was configured according to cloud security best...
If your organization handles online transactions with European citizens the eIDAS Regulation presents significant opportunities, but also creates new requirements.
nShield hardware security modules (HSMs) play a vital role in helping to secure eIDAS-compliant solutions that require digital certificates, time...
It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their...
Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning."
Compliance has long been a fact of life for IT and security teams. Compliance regulations originated as efforts to ensure data security and have since mushroomed into constantly changing and overwhelming challenges that consume disproportionate amounts of an organization's resources.
In this whitepaper, you'll...
The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.
When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption. But that approach no longer suffices, says First Data's Tim Horton, who calls for a new multilayered defense.
The EMV 3D Secure specification faces some milestone dates in Europe and the U.S. What are these milestones, and how does the standard fit into fundamental fraud defenses? Jackie Hersch of Fiserv shares insight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.