Remove 2018 Remove Data breaches Remove Data collection Remove Technology
article thumbnail

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The Department of Homeland Security did not respond to requests for comment, nor did the Department of Transportation.

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. In this milieu, even well-defended enterprises continue to suffer catastrophic data breaches. Digital transformation has only exacerbated this security skills gap.

Big data 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Colorado’s new law ups need for privacy awareness training

SC Magazine

Jared Polis, at the time Colorado’s governor-elect, speaks at a 2018 election night rally. And so as organizations collect more sensitive data, their employees should be more attuned, and… better trained on what constitutes sensitive data…”. Governor Polis last week signed the Colorado Privacy Act into law.

Education 109
article thumbnail

What happened in privacy in 2022

Malwarebytes

Period-tracking app users scrambled to find the most secure app online , and one period-tracking app maker promised to encrypt user data so that, even if law enforcement made a request for their data, the data would be unintelligible. In August, the company confirmed a data breach that affected 5.4

article thumbnail

New ‘digital trust exchange’ removes risks of managing PII of job applicants

SC Magazine

Any sanctions, watch lists and so on… I don’t need to know the underlying report and the data that comes with the background check report… Let’s say this person is divorced, and he’s got three kids, he bought a car in 2018, and he’s got a mortgage payment or a lease. Especially in the gig economy.

Risk 54
article thumbnail

Behavioral Analytics in Cybersecurity: Does It Work as Advertised?

eSecurity Planet

In the ever-evolving fight against data loss , data breaches, and data theft in the 21st century, organizations worldwide have turned to a number of cybersecurity solutions, services, and software in an attempt to keep their data safe and secure from threats. Why Use Behavioral Analytics in Cybersecurity?

article thumbnail

Survey Says…Cybersecurity Remains A Critical Challenge For Business

Privacy and Cybersecurity Law

On March 14, 2018, IBM Security announced the results of a new global study on organizational cybersecurity readiness and resiliency entitled “The 2018 Cyber Resilient Organization.” 23% of respondents say they do not currently have a CISO or security leader.