article thumbnail

Data Privacy and Security: It Takes Two to Tango

Thales Cloud Protection & Licensing

Data Privacy Day began in the United States and Canada in January 2008 as an extension of Data Protection Day in Europe. However, with technology innovation comes new risks, security challenges and threats. Cyber criminals are also evolving with technology to satisfy their nefarious goals.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

Technology underlying modern hyperscale cloud environments changes rapidly, but security misconfigurations became the key cloud security problem at least 10 years ago, and possibly 15–17 (!) years ago, and stayed “top of the charts” for all this time (public cloud computing was born, depending on who you ask, in 2006–2008).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

Technology underlying modern hyperscale cloud environments changes rapidly, but security misconfigurations became the key cloud security problem at least 10 years ago, and possibly 15–17 (!) years ago, and stayed “top of the charts” for all this time (public cloud computing was born, depending on who you ask, in 2006–2008).

article thumbnail

Growing Cyber Threats to the Energy and Industrial Sectors

NopSec

When the malware hit Saudi Aramco four years ago, it propelled the company into a technological dark age, forcing the company to rely on typewriters and faxes while it recovered. Attacks can also be for technological acquisition. If you’ve read cybersecurity news lately, you’ve probably heard that it’s back.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. Cybersecurity vendors like Panda Security suggest the best way to defend against crimeware is using a combination of antivirus, anti-spyware, firewalls, and threat detection technology. Phishing and Social Engineering.

Malware 105
article thumbnail

APT Attacks & Prevention

eSecurity Planet

APTs will contain a cyberattack component, but APTs also commonly include confidence schemes, social engineering , physical access to facilities , bribes, extortion, and other methods to gain system access. Deception technology can buy time and trigger alerts early for our security monitoring teams.

Firewall 109
article thumbnail

The Life and Death of Passwords: The Tipping Point in Passwordless Adoption

Duo's Security Blog

Making passwordless technology ubiquitous Chrysta: Consumers are already starting to unlock their phones, computers and accounts with their faces and fingerprints. That’s pushed a lot of technologies into individual users’ hands that allow them to start relying on passwordless authentication and to be able to stop using as many passwords.