article thumbnail

Tinder achieves certification in Information Security Management System

CyberSecurity Insiders

Tinder, the most popular dating app among millennials has achieved for the first time a certification in Information Security Management System that endorses that the user data on the company servers remains well protected from all kinds of cyber threats.

article thumbnail

Episode 212: China’s Stolen Data Economy (And Why We Should Care)

The Security Ledger

In this episode of the podcast (#212), Brandon Hoffman, the CISO of Intel 471 joins us to discuss that company’s latest report that looks at China’s diversified marketplace for stolen data and stolen identities. Data leaks, data breaches and data dumps are so common these days that they don’t even attract that much attention.

CISO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Still, over time, they’ve been woven into baseline data security regulations far and wide. NIST specs are echoed in the data loss disclosure and data privacy laws that have cropped up in many U.S. organizations between January 2013 and July 2019. states, for instance. million from U.S.

article thumbnail

Cybercrime Year in Review: 2013

SiteLock

In its annual Data Breach Investigations Report , published at the beginning of 2013, Verizon revealed that businesses with fewer than 100 employees made up the single largest group of victims of data breaches. Early in 2013, Chinese hackers were easily able to breach the extensive defenses the Times had in place.