Remove Course Remove Manufacturing Remove Retail Remove Security
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

LockBit claims responsibility for Capital Health security incident The LockBit ransomware group has claimed responsibility for an attack on Capital Health , a healthcare provider in Pennington, New Jersey, last November. KG Source 1 ; source 2 (New) Manufacturing Germany Yes 1.1 They accessed 41.5 Data breached: 41,500,000 records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

Key Developments in IoT Security. The rush to market for consumers to enjoy the modern conveniences offered by these devices shocked the security community. Security experts were concerned that these devices were built with no security in mind. Has the security of these devices gotten better, or remained the same?

IoT 100
article thumbnail

Risk Management under the DORA Regulation

IT Governance

You’d therefore expect that the sector fares better at data security than your average organisation. The public data set on the ICO (Information Commissioner’s Office) website shows that data security isn’t necessarily better for financial organisations. What do the statistics say? million (about £4.70

Risk 104
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? The Urgency for Security in a Connected World. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Device Security is Hard. Guest Blog: TalkingTrust. Thu, 03/11/2021 - 07:39.

IoT 77
article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

9 million records breached through decade-long data leak A former temporary employee of a subsidiary of NTT West (Nippon Telegraph and Telephone West Corp) illegally accessed about 9 million personal data records over the course of a decade (2013 to 2023). Breached records: more than 56 million.

article thumbnail

OpenText World Europe 2024 has taken flight

OpenText Information Management

Over the course of the last six months, much has shifted in the technology landscape, and much has advanced at OpenText. Help-desk employees can now find very specific, summarized answers from a deep repository of private, secured, semi-structured information in minutes instead of days. A year later, we have delivered on our promise.

Cloud 67