Remove 2019 Remove Cyber Attacks Remove Data privacy Remove Encryption
article thumbnail

The state of European cybersecurity and lessons to learn

Thales Cloud Protection & Licensing

And as our 2019 Thales Data Threat Report – Europe Edition recently revealed, many of these businesses become extremely vulnerable during digital transformation, with those in Europe being no different. Encryption, encryption, encryption. The financial and reputational damage could prove to be severe.

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Still, over time, they’ve been woven into baseline data security regulations far and wide. NIST specs are echoed in the data loss disclosure and data privacy laws that have cropped up in many U.S. Shamoon motivated the Saudis to seriously ramp up the work of its National Cyber Security Center. states, for instance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

After Springhill: Assessing the Impact of Ransomware Lawsuits

eSecurity Planet

The legal complaint [PDF] notes that on July 9, 2019, the day it was hit by a ransomware attack, Springhill Memorial Hospital contended that the event had “not affected patient care.” ” Cyber Insurance No Longer Reliable. Also read: Cyber Insurers Pull Back Amid Increase in Cyber Attacks, Costs.

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

In another case, a device management tool was deployed in a hospital and used the WiFi network to insure data privacy, as it provisioned connected devices. But ExtraHop noticed that the tool also opening encrypted connections to vendor-owned cloud storage, a major HIPAA violation. We met at Black Hat 2019.

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

As attack methodologies evolve due to AI, machine learning and nation-state hackers , security startups are receiving a lot of funding to develop products that can secure application access for remote workers , provide real-time visibility into cyber attacks and protect data as it travels from the cloud to IoT devices.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

Series B Apiiro Security 2019 Tel Aviv, Israel 65 $35.0 Series A BluBracket 2019 Palo Alto, CA 27 $18.5 Series A Cycode 2019 Tel Aviv, Israel 56 $81.0 Series B Open Raven 2019 Los Angeles, CA 45 $19.1 Most traditional tools used for investigating cyber attacks cannot assess potential impacts on these environments.

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

Russia’s asymmetrical cyber-attacks have been a well-documented, rising global concern for most of the 2000s. C yber a ttack s on Georgia (2008 , 2019 ) Georgian government websites get defaced; thousands of government and private websites get blocked, including two major TV stations. It’s not just Russia.