article thumbnail

MY TAKE: Here’s why we need ‘SecOps’ to help secure ‘Cloud Native’ companiess

The Last Watchdog

Security burden. Though DevOps-centric organizations can gain altitude quickly, they also tend to generate fresh security vulnerabilities at a rapid clip, as well. In that caper, a core API was left open allowing them to exploit it and begin using Tesla’s servers to mine cryptocurrency.

Cloud 152
article thumbnail

Weekly podcast: ICO GDPR campaign, Gwent Police, Binance and MediaGet

IT Governance

This week, we discuss the ICO’s new GDPR campaign for micro businesses, a potential data breach at Gwent Police, a US$250,000 reward from Binance and Windows Defender stops a massive malware campaign. If you need more guidance on GDPR compliance for your micro business, you can find a host of help at itgovernance.co.uk/gdpr.

GDPR 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 264

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 264 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

LockBit claims responsibility for Capital Health security incident The LockBit ransomware group has claimed responsibility for an attack on Capital Health , a healthcare provider in Pennington, New Jersey, last November. They accessed 41.5 The compromised data allegedly includes names, email addresses and phone numbers.

article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

Many questions surround the Blockchain’s compatibility with EU General Data Protection Regulation (GDPR). The CNIL is one of the first EU data protection supervisory authorities to provide guidance on the compliance of Blockchain with GDPR. If not, the CNIL recommends to use other technologies, more compliant with GDPR.

article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

All too many companies lack a full appreciation of how vital it has become to proactively manage and keep secure “unstructured data.”. Structured data can be human- or machine-generated, and is easily searchable information usually stored in a database, including names, Social Security numbers, phone numbers, ZIP codes. Delete data.

article thumbnail

What are the future threats in cyber security?

IT Governance

Last week the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) released their annual report on the cyber threats facing UK businesses. Cryptojacking is when cryptocurrency miners are delivered through malware, using a computer’s processing power to illicitly mine cryptocurrency. Cloud security.