Remove category international
Remove Data Remove Information Security Remove Security
article thumbnail

T-Mobile suffered a new data breach

Security Affairs

T-Mobile discloses a new data breach that impacted a “very small number of customers” who were victim of SIM swap attacks. T-Mobile has suffered another security breach, threat actors gained access to the accounts of “a small number of” customers.’. “Affected customers fall into one of three categories.

article thumbnail

Do you know the difference between cyber security and information security?

IT Governance

You often see people use the terms ‘ cyber security ’ and ‘ information security ’ interchangeably. That’s because, in their most basic forms, they refer to the same thing: the integrity and confidentiality of information. Information security. There are two sub-categories of information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data from Airlink International UAE leaked on multiple dark web forums

Security Affairs

Cybersecurity researchers from Cyble have spotted a threat actor sharing leaked data of Airlink International UAE for free on two different platforms. Cybersecurity researchers from Cyble have found a threat actor sharing leaked data of Airlink International UAE for free on two platforms on the dark web.

Insurance 135
article thumbnail

Building cyber security careers

IT Governance

The need for experienced and qualified cyber security professionals is a highlight of Cybersecurity Career Awareness Week , led by NICE (National Initiative for Cybersecurity Education). The most common skills gaps are “storing or transferring personal data, setting up configured firewalls, and detecting and removing malware”.

Security 110
article thumbnail

Security Affairs newsletter Round 369 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for free in your email box. If you want to also receive for free the newsletter with the international press subscribe here. To nominate, please visit:?. Pierluigi Paganini.

Security 130
article thumbnail

CHINA: Clarifications of data classification and grading requirements

DLA Piper Privacy Matters

Under the Data Security Law, organisations are required to classify the data they process according to their level of significance. Data classification. When classifying data, organisations should consider (i) the industry that their data belongs to, and (ii) the business attributes of the data (i.e.

article thumbnail

ISO 27001 and Physical Security

IT Governance

Physical access control, physical security monitoring, CCTV, and more When we hear the term ‘information security’ – or, for that matter, ‘ISO 27001’ – our thoughts usually turn straight to cyber security. However, physical security is also an important aspect of information and data security.