Threats & Breaches
6 Keys to Asset Protection for High-Net-Worth Individuals
Cybercriminals are using new and inventive strategies to target the personal assets of high-net-worth individuals. In the modern age, criminals can appropriate your assets and disrupt your personal privacy without ever stepping ...
New National Cybersecurity Strategy Will Require Compliance, Collaboration
The Biden administration’s recently released National Cybersecurity Strategy goes beyond the executive order it issued in 2021, which defined security measures any organization doing business with the federal government must follow. As ...
5 Ways to Reduce the Attack Surface for Microservices
Microservices is a software development approach where an application is divided into small, independent and loosely coupled services that work together to provide the application’s overall functionality. Each microservice is designed to ...
Orca Security Traces Cloud Vulnerabilities Back to Code
Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
IT Security Budgets Soar as Orgs Battle Rising Threats
Median IT security budgets have more than tripled—to $5.3 million in 2022 from $1.4 million in 2018—leading to a significant increase in the cost of combating cybersecurity threats over the past five ...
TikTok Abused Kids’ Data — UK Fines it $16 Million
$8.50 per child: UK regulator punishes TikTok at 5.5% of revenue. Says app illegally tracked children ...
Splunk: Cybersecurity Dynamics Rapidly Changing
A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability
Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
What the TikTok Ban Could Mean for GRC
The White House and TikTok’s critics in Congress have made it clear: They consider TikTok a dangerous social media app and national security threat. Throughout the March 23, 2023, congressional hearing, TikTok ...
Data Breaches in March 2023 – Infographic
A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, ...