List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

Doncaster-based One Call Insurance hit by ransomware (unknown) Ransomware attack on Swiss Cloud Computing AG (6,500) Wolfe Eye Clinic victim of Lorenz threat actors (unknown) One of the US’s largest pipelines shuts down to contain cyber security breach (unknown) J.

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? We logged 134 security incidents in December, which accounted for 148,354,955 breached records. That brings the total for 2020 to more than 20 billion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Gain Valuable Insights from Untapped Data Using AI

Perficient Data & Analytics

There are several industries that have proven use cases for cognitive computing solutions: Insurance. Insurance. Manufacturing. Energy & Utilities. You probably know your organization needs to invest in artificial intelligence (AI) solutions to take advantage of the deluge of data that mobile and digital users are creating, but do you know why or how? LEGACY ANALYTICS METHODS AREN’T EQUIPPED TO PROCESS ALL DATA TYPES.

NHTSA Releases New Automobile Cybersecurity Best Practices

Hunton Privacy

The National Highway Safety Administration (“NHTSA”) recently issued non-binding guidance that outlines best practices for automobile manufacturers to address automobile cybersecurity. The guidance, entitled Cybersecurity Best Practices for Modern Vehicles (the “Cybersecurity Guidance”), was recently previewed in correspondence with the House of Representatives’ Committee on Energy and Commerce (“Energy and Commerce Committee”).

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

This post has been updated. . On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure.

The Internet of Things (IoT): Managing the Data Tsunami

Collibra

The Internet-of-Things has the potential to transform a range of industries – from automotive and agriculture through to healthcare, home appliances and insurance services. But exactly how that data is utilized (and potentially monetised) will differ across sectors. For example, data collected by wearable health-tracking devices has become of increasing importance and value to providers of life and medical insurance.