The value of your Identity Governance and Administration (IGA) program is directly proportional to the quality and richness of the identity data available to it. Policies, automation, and workflows are only as good as the data that feeds them. What we believe about the state of our data is often inconsistent with...
A French law requiring companies to report cyber incidents to authorities within 72 hours or lose their eligibility for cyber insurance reimbursement has practitioners scratching their heads. Global companies with headquarters in France will have the most uncertainty, experts say.
Records of more than half a million customers of a lending service owned by India's largest private sector bank are apparently downloadable for free on a criminal data breach forum. HDFC Bank says it detected a data breach at one of its service providers that processes customer information.
Identity verification and e-signature firm OneSpan is working with investment bank Evercore on a sale process that could attract interest from other businesses and private equity firms, Reuters reported. This follows five publicly traded cyber vendors agreeing to go private since the start of 2022.
Spoiler alert: In 2022, audits found open source in 100% of our customer engagements.
Since open source usages are now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Consequently, open source security and license compliance...
Privacy concerns involving the tracking, collection and disclosure of sensitive health data of consumers - without their knowledge or consent - remain top enforcement priorities for federal regulators, as well as top legislative fodder for some members of Congress.
Arctic Wolf has expanded its security operations platform into threat intelligence, incident response and cyber insurance, says CEO Nick Schneider. The company has focused on putting businesses in the best possible position to answer questions from insurance carriers following a security incident.
Platform players such as Cisco and Palo Alto Networks and pure-play vendors such as Lookout and Versa Networks top the first-ever vendor evaluation of the SASE market. Versa edged out Palo Alto Networks in product leadership, and Cisco was a distant third, the KuppingerCole Leadership Compass found.
Technologists were quick to point out that popular AI-based chatbot, ChatGPT, could lower the bar for attackers in phishing campaigns and even write malware code, but Cato Networks' Etay Maor advises taking these predictions "with a grain of salt" and explores the pros and cons of ChatGPT.
The Biden administration's national cybersecurity strategy emphasizes bolstering critical infrastructure sector protections, including setting minimum security requirements and enhancing collaboration. But observers says the industry needs more resources and a better security posture to comply.
Eset researchers discovered the first in-the-wild bootkit malware, BlackLotus, bypassing security and booting up on fully up-to-date Windows 11 systems. Researchers found the Unified Extensible Firmware Interface bootkit in 2022, being sold on hacking forums for $5,000.
In the latest weekly update, four ISMG editors share highlights of ISMG's upcoming Engage Toronto event and discuss how the U.S. Supreme Court may undercut the identity theft statute and how - despite tough economic times - vendor Wiz boosted its valuation by $4 billion in 16 months.
Cybersecurity will take its place alongside chemical contaminant removal as an element the U.S. Environmental Protection Agency says public water systems must mitigate. "Cyberattacks that are targeting water systems are real and a significant threat," said an EPA official.
Zscaler has axed nearly 180 workers after more deliberation from new customers around large purchasing decisions led to reduced billings growth. The company revealed plans to cut its 5,900-person staff by roughly 3% - or about 177 positions - as it adapts to a more challenging business environment.
Prioritization to Prediction (P2P) is an ongoing research series intended to help enterprises gain mission-critical insight into more effective and efficient vulnerability management (VM) practices. Kenna Security at Cisco, the pioneer of risk-based vulnerability management, teams up twice-yearly with the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.