What are the biggest privacy and security concerns in healthcare when it comes to the use of big data and data analytics tools? Attorneys Elizabeth Mann and Brad Peterson explain what organizations need to know before they dig in.
Leading the latest edition of the ISMG Security Report: ISMG's Managing Editor, Security and Technology, Jeremy Kirk, details Australia's HealthEngine caught in a data-sharing fiasco.
Adoption of cloud services, SAAS Applications and mobile workforce are putting increasing strain on the corporate networks. This is exacerbated as organizations look to better connect their remote and branch office employees and offer them higher quality network services. Enterprises are turning to SD-WAN - a more...
Ticketmaster is warning customers that it suffered a data breach after an attacker modified its third-party chatbot software to steal customers' payment card details. Software provider Inbenta Technologies says Ticketmaster should never have been running the JavaScript software on a payments page.
A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.
As we've seen from many of the headlines lately, breaches continue to do extensive financial and reputational damage to many major companies. A recent analyst report indicates that the average breach costs the organization $4 million in total costs, which represents $158 per breached user record. Other studies have...
Data is the lifeblood of an organization, used to make decisions and tell us how things are running. Apps are driving digital transformations across every industry, but these apps are just new interfaces to connect users with data. Data has value both to the organization and to modern-day pirates, who seek to steal...
Read this Infographic to understand how to Prevent data breaches by vaulting administrative credentials and
controlling privileged user access through multifactor authentication credentials and login restrictions detect abnormal behaviors.
The European Union's (EU's) General Protection Regulation (GDPR), which began enforcement on May 25, 2018, dramatically increases the penalties for failing to properly protect users' personal . The maximum fines that can be leveraged against an organization eclipse penalties that have been imposed in the past; they...
The European Union's (EU's) General Data Protection Regulation (GDPR), which began enforcement on May 25, 2018, dramatically increases the penalties for failing to properly protect users' personal data. The maximum fines that can be leveraged against an organization eclipse penalties that have been imposed in the...
The European Union's (EU's) General Data Protection Regulation (GDPR), which began enforcement on May 25, 2018, dramatically increases the penalties for failing to properly protect users' personal data. The maximum fines that can be leveraged against an organization eclipse penalties that have been imposed in the...
The European Union's (EU's) General Data Protection Regulation (GDPR), which began enforcement on May 25, 2018, dramatically increases the penalties for failing to properly protect users' personal data. The maximum fines that can be leveraged against an organization eclipse penalties that have been imposed in the...
Reality Leigh Winner, 26, a former contractor for the NSA, has pleaded guilty to leaking a "top secret" five page document that describes Russian meddling with U.S. voting systems. She's agreed to a plea deal that calls for her to serve a 63-months prison sentence.
Privacy rights groups are calling on the Court of Justice of the European Union to clamp down on at least 17 EU governments that require domestic telecommunications firms to store all communications data, despite the court having ruled that such mass surveillance practices are illegal.
Helping victims know their passwords have been exposed in a data breach is half the battle in the fight to improve password security. To help, Mozilla and 1Password are integrating into their products a feature from the popular "Have I Been Pwned" breach notification service.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.