HSBC, one of the largest banks in the world, confirmed this week that some of its US customers' bank accounts were hacked in October, possibly by stolen credentials.
The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
2017 was marked by global ransomware outbreaks, seemingly countless data breaches, and little legislative movement from Congress.
The Equifax data breach—one of the largest breaches ever made public—has the potential to be the catalyst for a major change in the way that courts look at the damage that data breaches cause to victims.
A group of attackers with suspected ties to the Russian government has been conducting a long-term campaign that has penetrated the networks of energy providers in both the United States and Europe, giving them access to vital systems and the potential ability to cause power disruptions at their leisure.
Computer science and security rely on precision for the descriptions of their constructs and concepts. But there are some things that defy description in these realms, and the Yahoo data breach is one of them.
Reasonable people can, and often do, disagree about what constitutes a proper public response to a data breach. Some people want immediate and full disclosure of all of the details of the event, while others tend to favor a more measured approach, releasing some information at the beginning and more data as things shake out.
Data breaches come in all shapes and sizes. Some, like the attacks on Target and Home Depot, are big, public, and expensive. Others can be small and quiet, but no less expensive in the long run.
Since the beginning of the data breach era, which most often is pegged to the disclosure of the ChoicePoint compromise, security analysts have been looking for telltale signs of shifts in the techniques and motives that attackers are using. But after more than a decade of breaches and the collection of data about what’s caused them, what’s become clear is that there’s no magic or mystery behind it.