Remove Data Remove Financial Services Remove Retail Remove Webinar
article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. TB of ASA Electronics data to its leak site The ALPHV/BlackCat ransomware gang is attempting to extort a ransom from ASA Electronics for 2.7 Data breached: 2.7

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 The culprit: lax practices of a third-party data and analytics contractor. One might assume top-tier financial services firms and healthcare vendors would have solved third-party cyber exposures by now. Uphill battle.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Scalability Imperative: Responsiveness to Manage Planned and Unplanned Spikes

Reltio

This post offers a look at the topic of scalability, outlining what the concept means and how it applies to customer data management, with some customer examples. The issue is particularly prevalent in industries like retail and financial services, which can contend with massive spikes in usage based on seasonality and marketing initiatives.

Retail 68
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data breached: 36 million records. Data breached: 6,935,412 individuals’ data. Data breached: 6.9 Only 3 definitely haven’t had data breached.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. The data set is a collection of 1 billion credentials sourced from stealer logs and hosted on the illicit.services website. Data breached: 70,840,771 email addresses.

article thumbnail

In High Demand - How Thales and DigiCert Protect Against Software Supply Chain Attacks

Thales Cloud Protection & Licensing

Also called backdoor attacks, they cleverly exploit third-party software vulnerabilities to access an organization’s systems and data. The news has already captured some very high-profile incidents, including attacks on an American retailer, a software vendor, and more recently a multinational investment and financial services bank.

Risk 62
article thumbnail

The Role of Master Data Management in Enabling Omnichannel Connected Customer Experiences

Reltio

Data plays a key role in enabling omnichannel connected customer experiences. It's critical that sales, call center, support, field services, and customer-facing operations teams have the data and customer experience processes to deliver connected customer experiences. Enabling Omnichannel Connected Customer Experiences.