Remove category security-breach
article thumbnail

GUEST ESSAY: Addressing data leaks and other privacy, security exposures attendant to M&As

The Last Watchdog

Such consolidation across markets is good news for customers and vendors alike in terms of market growth and maximizing security investments. Throughout this period, the risk level of the acquirer is much higher than the acquired company, creating a major cybersecurity gap as they merge their tech stack and security tools together.

Privacy 265
article thumbnail

What VCs See Happening in Cybersecurity in 2023

eSecurity Planet

Despite all this, there is one tech category that has held up fairly well: Cybersecurity. Just today, security and compliance automation firm Drata announced a $200 million Series C funding round that brings the company’s valuation to $2 billion, doubling its $1 billion valuation from its Series B round last year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’ll often see the terms cyber security and information security used interchangeably. In this blog, we explain what information security and cyber security are, the differences between them and how they fit into your data protection practices. What is information security? This is cyber security.

article thumbnail

China-linked threat actors have breached telcos and network service providers

Security Affairs

China-linked threat actors have breached telecommunications companies and network service providers to spy on the traffic and steal data. US NSA, CISA, and the FBI published a joint cybersecurity advisory to warn that China-linked threat actors have breached telecommunications companies and network service providers.

article thumbnail

OWASP Names a New Top Vulnerability for First Time in Years

eSecurity Planet

OWASP security researchers have updated the organization’s list of the ten most dangerous vulnerabilities – and the list has a new number one threat for the first time since 2007. The Open Web Application Security Project (OWASP) is a nonprofit foundation and an open community dedicated to security awareness.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

Italian authorities are investigating OpenAI for suspected violations, even going so far as to ban ChatGPT briefly. Many businesses find it hard to implement GDPR requirements because the law is not only complex but also leaves a lot up to discretion. However, it gives businesses some leeway in how they enact those rules.

GDPR 78
article thumbnail

Penetration testing methodologies and standards

IBM Big Data Hub

To mitigate and prepare for such risks, penetration testing is a necessary step in finding security vulnerabilities that an attacker might use. A penetration test , or “pen test,” is a security test that is run to mock a cyberattack in action. These attacks are often performed by red teams, or offensive security team.

Risk 76