Remove 11
Remove 2023 Remove Data Remove Privacy Remove Retail
article thumbnail

The Week in Cyber Security and Data Privacy: 11 – 18 December 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data breached: personal data belonging to 14,690,284 individuals. Data breached: personal data belonging to 14,690,284 individuals. Data breached: 8 TB.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Financial information, medical data, health reimbursements, postal addresses, telephone numbers and emails are not thought to have been compromised.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Retail Data Threat Environment and Why CIAM is a Key Cornerstone to Better Cybersecurity.

Thales Cloud Protection & Licensing

The Retail Data Threat Environment and Why CIAM is a Key Cornerstone to Better Cybersecurity. madhav Thu, 05/11/2023 - 06:06 The retail landscape has changed significantly. In retail, everything changes fast: processes, procedures, and technology. Everyone needs to increase the level of retail cybersecurity.

Retail 71
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. The data is more than mere credentials, too – according to Cybernews, most of the exposed data is sensitive. In total, 3,876 domain names were included in the exposed data set.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. The data set is a collection of 1 billion credentials sourced from stealer logs and hosted on the illicit.services website. Data breached: 70,840,771 email addresses.

article thumbnail

Self-Sovereign Identities, The Next Step in Privacy-First User Experience

Thales Cloud Protection & Licensing

Self-Sovereign Identities, The Next Step in Privacy-First User Experience divya Tue, 03/21/2023 - 06:10 There is a growing momentum around Self-Sovereign Identities (SSI) with real value to be captured by individuals, countries, and businesses. When privacy is at stake, SSI puts individuals back in control of their personal data.

Privacy 71
article thumbnail

Ready for Take-off: Rising Above Airport Cybersecurity Challenges

Thales Cloud Protection & Licensing

Ready for Take-off: Rising Above Airport Cybersecurity Challenges sparsh Thu, 11/16/2023 - 04:52 Aviation is a fast-paced world, with airports around the globe serving billions of passengers annually. Also, on average, airports can process up to seven pieces of personal data for every passenger.