Remove category international
article thumbnail

Top 12 Cloud Security Best Practices for 2021

eSecurity Planet

CloudPassage’s 2021 AWS Cloud Security Report found that misconfiguration of cloud platforms (71 percent), exfiltration of sensitive data (59 percent), and insecure APIs (54 percent) are the top cloud security threats facing cybersecurity professionals. What authentication methods does the provider support? Train your staff.

Cloud 132
article thumbnail

New York’s Breach Law Amendments and New Security Requirements

Data Protection Report

Biometric information that is used to authenticate or ascertain the individual identity. New York retains its very broad definition of “personal information” (“any information concerning a natural person, which, because of name. 6) Adjusts the security program in light of business changes or new circumstances.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NYDFS proposes significant cybersecurity regulation amendments

Data Protection Report

On July 29, 2022, the New York Department of Financial Services (NYDFS) announced a “pre-proposed outreach” of material proposed changes to almost every section of its cybersecurity regulations, and would affect each entity covered by the current regulations of 23 NYCRR Part 500. Cybersecurity Risk Assessments.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Adopting the NIST Cybersecurity Framework.

article thumbnail

CyberheistNews Vol 13 #25 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches

KnowBe4

It also highlights the difficult obstacles confronted by international organizations in preventing state-sponsored cybercrime. Microsoft Defender Experts uncovered a multi-stage adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attack against banking and financial services organizations," the researchers write.