New & Notable
Data security breaches News
January 21, 2020
Here is a list of 10 of the largest data breaches (mostly) from the second half of 2019, including DoorDash, T-Mobile, Capital One and more.
December 05, 2019
A security researcher used a mishandled session cookie to access private HackerOne bug reports with an account takeover attack and earned a bug bounty for their efforts.
November 26, 2019
An IT services vendor is the latest ransomware victim in an attack that has affected roughly 110 nursing homes and acute care facilities.
November 14, 2019
InfoTrax settled an FTC complaint over an extensive data breach that lasted two years. Now, it can no longer collect any personal data until it implements its own infosec program.
Data security breaches Get Started
Bring yourself up to speed with our introductory content
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Cyber insurance coverage can help companies successfully navigate the aftereffects of a data breach. However, choosing a policy in the first place can be confusing. Continue Reading
Check out what questions to ask MSPs to make sure they have the right security systems in place to protect your organization against outsourcing IT risks. Continue Reading
Evaluate Data security breaches Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cybersecurity insurance coverage can certainly have its benefits after a breach, but companies must consider a variety of unique business factors before choosing a policy. Continue Reading
Attack simulation tools -- along with third-party penetration testing -- can help improve an organization's enterprise security. Find out why. Continue Reading
In this Q&A, Onapsis CEO Mariano Nunez and SAP security head Tim McKnight discuss the recent SAP security system threat and what companies can do to protect systems and data. Continue Reading
Manage Data security breaches
Learn to apply best practices and optimize your operations.
From growing attack surfaces to new regulations, these data security considerations must be on every company's radar. Continue Reading
Dig into five data breach risk factors, and learn how the DRAMA data breach response model can help enterprises counter breaches in a timely and efficient manner. Continue Reading
Thanks to automation and other features, breach and attack simulation tools are an effective way to help network administrators keep their operations secure. Continue Reading
Problem Solve Data security breaches Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As data security threats evolve, knowing how to protect your data is more important than ever. Learn about the latest security threats and how to ward them off. Continue Reading
While liaison officer responsibilities vary depending on the company they work for, their strong organizational and communications skills make them critical to incident response. Continue Reading
When it comes to insider threat awareness and prevention, enterprises would be wise to marry a people-centric approach with a technology-centric approach. Continue Reading