Remove 10
Remove 2014 Remove Analysis Remove Data Remove Insurance Remove Security
article thumbnail

Australian Privacy Regulator Sues in Data Breach Case

Hunton Privacy

Patrick Gunning from King & Wood Mallesons reports that, on November 2, 2023, the Australian Information Commissioner filed proceedings in the Federal Court of Australia against Australian Clinical Labs Limited seeking a civil penalty ( i.e. , a fine) in connection with the company’s response to a data breach that occurred in February 2022.

article thumbnail

Threat actors using FrameworkPOS malware in POS attacks

Security Affairs

Security experts at Morphisec observed a wave of attacks against point-of-sale (PoS) thin clients using card data scraping malware and the Cobalt Strike beacon. Over the past 8-10 weeks, security experts at Morphisec observed multiple sophisticated attacks targeting PoS thin clients worldwide. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

So here it is - 10 Personal Financial Lessons for Technology Professionals. I don't just mean at the crazy rich end of the scale (4 of the world's top 10 richest people did it in tech - Bezos, Gates, Zuckerberg and Ellison), but at all levels of our profession. Intro: This Industry Rocks!

Education 111
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. Srivastav 2014, p 18). Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. Risk Management and DT Experience. Uncertainty and risk are not the same.

article thumbnail

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

The threat actor mainly targets insurance, consulting, and construction companies. Disrupting the Internet in a certain country requires long-term preparation, but Group-IB’s analysis of attacks described in its report proves that it is technically feasible. Bank card compromise, carding, and data leaks.

IT 84
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors.