Remove category security-breach
article thumbnail

List of data breaches and cyber attacks in July 2018 – 139,731,894 million records leaked

IT Governance

Another month passes where I’m left thinking ‘I should really create a Healthcare category’. There were some incredibly sensitive breaches this month, the majority of which were caused by human error. I imagine human error will continue to be the main cause of data breaches for decades to come – damn humans. Data breach.

article thumbnail

China-linked threat actors have breached telcos and network service providers

Security Affairs

China-linked threat actors have breached telecommunications companies and network service providers to spy on the traffic and steal data. US NSA, CISA, and the FBI published a joint cybersecurity advisory to warn that China-linked threat actors have breached telecommunications companies and network service providers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Majority of CCPA Amendment Bills Passed by California Legislature

Hunton Privacy

California marked the end of the 2019 legislative session this past Friday, September 13, by passing five out of six pending bills to amend the California Consumer Privacy Act of 2018 (“CCPA”). and the vehicle’s manufacturer. Code § 1798.140(o)(2)). Adds definitions of “contractor,” “director,” “officer” and “owner.”

Sales 48
article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

Insider threats are one of the most difficult security challenges that organisations face. Preventing this from happening requires a nuanced approach to information security, and it’s one that organisations are increasingly struggling with. Insider threats fall into two categories: malicious or negligent.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And I was really fortunate to land the security beat right away. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? WANG : it was the security security practice. By accident. So I learned.

Cloud 40