Sat.Dec 14, 2019 - Fri.Dec 20, 2019

Ransomware Risk Management: 11 Essential Steps

Data Breach Today

Tips From a Cybersecurity Veteran on Winning the Battle In this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up evolving ransomware risks and offers a list of 11 critical mitigation steps

Risk 116

Don't Make Security Training a 'One-and-Done'

Dark Reading

How to move beyond one-off campaigns and build a true security awareness program

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

It’s Time for Your SOC to Level Up

Threatpost

Artificial intelligence can provide manpower, context and risk assessment. Breach Cloud Security Critical Infrastructure InfoSec Insider IoT Malware Mobile Security Vulnerabilities Web Security ai alert fatigue artificial intelligence balbix benefits guarav banga infosec insider risk assessment security operations center workforce shortage

IT 47

Data Compliance in a World of Data Privacy Concerns

InfoGoTo

We live in an age where we have the ability to collect and utilize more data than ever. As the amount of data we’re responsible for increases, so do concerns that we’re handling it properly. Data compliance refers to statutes and regulations that provide accountabilities, processes and operational obligations for the collection, storage, format and use of data.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

CCPA 2.0 Moves to Next Critical Stage of Referendum Process

Data Matters

In the evening of December 17, 2019, Californians for Consumer Privacy , the consumer privacy rights organization led by Alastair Mactaggart that propelled California towards the U.S.’s s first comprehensive privacy legislation , tweeted the Attorney General’s release of the title and summary for Initiative 19-0021.

More Trending

The Lifecycle of Stolen Payment Data

Data Breach Today

Fiserv's Christine El Eris on How Fraudsters Sit on and Sell Stolen Card Data Even in the post-EMV era, payment card data is very much thriving on the dark web. Why is data still so accessible to fraudsters, and how can card issuers and merchants alike improve card data security?

Access 207

Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up

Krebs on Security

As if the scourge of ransomware wasn’t bad enough already: Several prominent purveyors of ransomware have signaled they plan to start publishing data stolen from victims who refuse to pay up.

Cloud Data Security: Who Should Hold the Keys?

Thales eSecurity

Nearly half (48%) of all corporate data is stored in the cloud according to the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute.

6 Traits to Develop for Cybersecurity Success

Dark Reading

Cultivate these half-dozen qualities and watch your career soar

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Insurer Races to Fix Security Flaws After Whistleblower Alert

Data Breach Today

Report: Blue Cross and Blue Shield Minnesota Had Thousands of Old 'Critical' Vulnerabilities Blue Cross and Blue Shield Minnesota is reportedly racing to address tens of thousands of security vulnerabilities after a whistleblower on the health insurer's security team alerted the company's board of trustees about the problems.

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

The U.S.

Immigration and Customs Enforcement Scheduled Approved

National Archives Records Express

On December 11, 2019, the Archivist of the United States approved a request for disposition authority from the U.S. Immigration and Customs Enforcement (ICE) for Detainee Records (schedule DAA-0567-2015-0013). This schedule was originally proposed to NARA on October 26, 2015. NARA published notice of the pending schedule in the Federal Register on July 14, 2017.

FOIA 84

A study reveals the list of worst passwords of 2019

Security Affairs

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by analyzing data leaked in various data breaches.

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Wawa Stores: POS Malware Attack Undetected for 8 Months

Data Breach Today

Convenience Store Chain Says Payment Card Data Exposed The Wawa convenience store chain is investigating why malware planted on point-of-sale devices at nearly all of its over 850 locations throughout the East Coast went undetected for nearly eight months

Sales 200

Nuclear Bot Author Arrested in Sextortion Case

Krebs on Security

Last summer, a wave of sextortion emails began flooding inboxes around the world. The spammers behind this scheme claimed they’d hacked your computer and recorded videos of you watching porn, and promised to release the embarrassing footage to all your contacts unless a bitcoin demand was paid.

Sales 146

5 Security Resolutions to Prevent a Ransomware Attack in 2020

Dark Reading

Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network

More than 267 millions of Facebook user phone numbers exposed online

Security Affairs

Security researcher Bob Diachenko discovered more than 267 million Facebook user IDs, phone numbers and names in an unsecured database. Security expert Bob Diachenko, along with Comparitech, has discovered more than 267 million Facebook user IDs, phone numbers and names in an unsecured database.

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Facebook Wins an EU Privacy Ruling

Data Breach Today

Will Dispute Over Sharing European's Data With US Continue? Facebook's sharing of data of European users with the U.S. is legal and provides enough protections, the legal adviser to the EU's top court said on Thursday

New Orleans Hit By Ransomware Attack

Adam Levin

New Orleans has declared a state of emergency following a ransomware attack. The city government has effectively been offline since December 13 when employees were instructed to turn off all computers and disconnect them from WiFi networks following reports of suspicious network activity. .

China-Based Cyber Espionage Group Targeting Orgs in 10 Countries

Dark Reading

Dozens of organizations across multiple sectors have become victims of APT20 in the past two years

81

TP-Link Archer routers allow remote takeover without passwords

Security Affairs

TP-Link has addressed a critical vulnerability impacting some TP-Link Archer routers that could allow attackers to login without passwords.

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Fraud Prevention: Keeping Up With Attackers

Data Breach Today

Anthony Cardoza of XTN Cognitive Security on Defensive Measures Fraud prevention is a perpetual cat-and-mouse game as fraudsters develop new tools and uncover new ways to monetize their activities, says Anthony Cardoza of XTN Cognitive Security, who offers defensive insights

70% of Organizations Experienced Internal Data Breaches in the Last Five Years

Adam Levin

Internal data breaches are on the rise, with 70% of security professionals reporting that it’s happened to them in the last five years.

How to Manage API Security

Dark Reading

Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other

A thief stole hard drives containing Facebook payroll data from a car

Security Affairs

Facebook informed its employees that hard drives containing information about its workers’ payroll were stolen from a car last month. On Friday, Facebook announced that hard drives containing information about its workers’ payroll were stolen from a car last month.

IT 83

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

AI: 'We're Having the Wrong Conversation'

Data Breach Today

Chris Calvert of Respond Software on the Proper Roles for Machines Just by using the term "artificial intelligence," we're already having the wrong conversation about machines and cybersecurity, says Chris Calvert of Respond Software. What conversations should we be having?

Creditors Seek to Exhume the Body of a Dead Crypto Executive 

WIRED Threat Level

Gerry Cotten took at least $137 million to the grave when he died without giving anyone the password to his encrypted laptop. Security Business Business / Blockchain and Cryptocurrency

As Hackers Target Mobile Payment Apps, Here's How to Keep Them at Bay

Dark Reading

A little vigilance helps retailers reduce and prevent three of the most common kinds of mobile app fraud