article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Health Insurance Portability and Accountability Act (HIPAA).

CSO 128
article thumbnail

Apple finally adds encryption to iCloud backups

CSO Magazine

Apple today introduced several new security features focused on fending off threats to user data in the cloud, including end-to-end encryption for backups for iCloud users. Apple also announced hardware Security Keys for Apple ID, giving users the choice to require two-factor authentication to sign into their Apple ID account.

Backups 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Lots of accounts including Bezos, Elon Musk, Joe Biden, Barack Obama, Bill Gates, Mr Beast, and a ton more getting hacked for a bitcoin scheme. Katie Moussouris | @k8em0.

article thumbnail

Wegmans reports misconfigurations on two cloud databases

SC Magazine

In a notice released to its customers, Wegmans said the type of customer information included names, addresses, phone numbers, birth dates, Shoppers Club numbers, and email addresses and passwords for access to Wegmans.com accounts. Tracy said companies really need to understand the shared security model of the cloud providers.

CSO 107
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

If the data is online, then it’s accessible to bad actors and just waiting to be encrypted for ransom. From there, it’s possible to find devices with privileged accounts and take the attack further. Back up your data and secure your backups in an offline location. Food for thought, eh!

article thumbnail

Rash of hacktivism incidents accompany Russia’s invasion of Ukraine

CSO Magazine

Late last week, a Twitter account purporting to represent Anonymous wrote that “The #Anonymous collective has taken down the website of the #Russian propaganda station RT News.” The hackers purportedly compromised the railway system’s routing and switching devices and rendered them inoperable by encrypting data stored on them.

DDOS 115
article thumbnail

The 7 best password managers for business

CSO Magazine

A password manager is a program that stores passwords and logins for various sites and apps, and generates new strong passwords when a user needs to change an old one or create a new account. Users can sign into a password manager with a single strong password or by using biometrics, and access all their login information.