article thumbnail

2018 Health Data Breach Tally: An Analysis

Data Breach Today

Hacking Incidents Still Dominate, But Fewer Huge Incidents Than in Years Past Major health data breaches added to the official federal tally in 2018 impacted more than twice as many individuals as the incidents added to the list 2017.

article thumbnail

Analysis: Verizon's Breach Report 2018

Data Breach Today

Verizon's latest Data Breach Investigations Report shows that half of data breaches in 2017 worldwide were orchestrated by organized cybercriminal groups, says Verizon's Ashish Thapar, who offers an in-depth analysis of the findings.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Tuesday, November 2018 Edition

Krebs on Security

This week’s patch batch addresses two flaws of particular urgency: One is a zero-day vulnerability ( CVE-2018-8589 ) that is already being exploited to compromise Windows 7 and Server 2008 systems. Of course, if the target has Adobe Reader or Acrobat installed, it might be easier for attackers to achieve that log in.

article thumbnail

Changing Attitudes Towards GDPR Enforcement and Compliance: 2018 – 2023

IT Governance

A gap analysis will be undertaken to identify any missing information. They began profiting by selling targeted advertising and access to their analysis of this ‘ behavioural surplus ’ to other organisations that wanted to predict how consumers might behave. (As The responses provided by your suppliers will be reviewed and assessed.

GDPR 96
article thumbnail

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.

article thumbnail

Patch Tuesday, August 2018 Edition

Krebs on Security

According to security firm Ivanti , the first of the two zero-day flaws ( CVE-2018-8373 ) is a critical flaw in Internet Explorer that attackers could use to foist malware on IE users who browse to hacked or booby-trapped sites. Microsoft’s analysis is here. One nifty little bug fixed in this patch batch is CVE-2018-8345.

Paper 114
article thumbnail

Threat actor has been targeting the aviation industry since at least 2018

Security Affairs

” reads the analysis published by Cisco Talos. ” Our research shows that this actor has been targeting the aviation industry since at least 2018, with files mentioning both “Trip Itinerary Details” and “Bombardier” at the time using the URL akconsult[.]linkpc[.]net.” Pierluigi Paganini.

Phishing 105
article thumbnail

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.".