Data Security
OpenAI’s GDPR Travails Demonstrate Need for Data Security-by-Design
After several weeks of incredible growth, OpenAI has come in for a bumpy ride of late. First it revealed details of a data breach exposing a significant number of ChatGPT subscribers. Then ...
How CISOs Can Influence API Security Change
Security incidents can cost a chief information security officer (CISO) their job. For example, cybersecurity breaches at Capital One, Uber, Equifax and plenty of others have led to the firing or forced ...
Cyberattacks 2022: Phishing, Ransomware & Data Breach Statistics
Cyberattacks had yet another record-breaking year in 2022. Here's some statistics and trends on phishing, ransomware, and data breaches to be aware of ...
JavaScript: A Taxing Situation
An authorized IRS eFile website is the latest victim of a JavaScript attack. eFile.com has become the victim of an attack which originated in a previously innocent JavaScript file. The javascript file, ...
TikTok Abused Kids’ Data — UK Fines it $16 Million
$8.50 per child: UK regulator punishes TikTok at 5.5% of revenue. Says app illegally tracked children ...
Lessons Learned from the Ongoing LastPass Data Breach Saga
5 min read The LastPass data breach debacle could happen to anyone. We break down the ongoing attacks and offer tips for avoiding a similar fate. The post Lessons Learned from the ...
What the TikTok Ban Could Mean for GRC
The White House and TikTok’s critics in Congress have made it clear: They consider TikTok a dangerous social media app and national security threat. Throughout the March 23, 2023, congressional hearing, TikTok ...
Data Breaches in March 2023 – Infographic
A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, ...
White House Moves to Address Software Supply Chain Security
No one wants a repeat of the SUNBURST cyberattack, but without any action to improve cybersecurity within the software supply chain, another SUNBURST—or worse—attack is inevitable. And we still may see a ...
ATO Attacks: What Organizations Need to Know
Attackers can use compromised credentials to gain unauthorized access to an organization's information, leading to ATO attacks. The post ATO Attacks: What Organizations Need to Know appeared first on Enzoic ...