Remove category security-breach
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
article thumbnail

Federal Privacy Commissioner Published Guidance on What Is “Sensitive” Personal Information

Data Protection Report

Whether to report a breach of security safeguards to the OPC and notify impacted individuals. The combination of these seemingly innocuous categories can drastically increase the sensitivity of an individual’s personal information. In other cases, combined personal information (e.g., Health Information.

Privacy 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New CNIL €400,000 fine for data security breaches and non-compliance with data retention period under the GDPR

Data Protection Report

The issue giving rise to the financial penalty was a security breach relating to the company’s website notified by a user to the CNIL on 12 August 2018. According to SERGIC, the website’s security breach could have impacted around 29,440 users.

GDPR 40
article thumbnail

Capital One Data Theft Impacts 106M People

Krebs on Security

Incredibly, much of this breach played out publicly over several months on social media and other open online platforms. That data included approximately 140,000 Social Security numbers and approximately 80,000 bank account numbers on U.S. The tip that alerted Capital One to its data breach.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. In 2016 the term “content services” entered management’s vernacular when Gartner redefined ECM to focus on CS applications, platforms, and components (Shegda, et al.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Designing an Enterprise-Level Approach. Principle 5.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Information security products , services, and professionals have never been in higher demand, making for a world of opportunities for cybersecurity startups. With evolving attack methodologies due to machine learning, quantum computing, and sophisticated nation-state hackers, security startups are receiving record funding.