article thumbnail

Chinese threat actors extract big data and sell it on the dark web

SC Magazine

Among the incidents data stolen by Chinese hackers involved a Twitter database. Researchers on Monday reported that cybercriminals are taking advantage of China’s push to become a leader in big data by extracting legitimate big data sources and selling the stolen data on the Chinese-language dark web.

Big data 100
article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

This dual premise and promise is reflected in our Data Threat Report-Europe Edition – with over a third (36%) of enterprises stating they are now aggressively disrupting the markets they participate in through a digital transformation project or embedding digital capabilities that enable greater organisational agility. Blockchain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow

CyberSecurity Insiders

In today’s ultra-competitive MSSP market , business owners are looking for ways to make their offerings more attractive to customers and their SOCs more effective. SIEMs are Data Hogs. Cybersecurity today is a data problem, scratch that, it’s a BIG BIG data problem. or “Can I bring in data from ABC product?”

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Living off the land’ LogicHub aims to be at the leading edge of this emerging market. “The SOAR has improved data collection and data enrichment, and playbook responses have helped reduce the workload of human analysts. That held true until 1996 when Kasparov lost a chess match to IBM’s Deep Blue supercomputer.

Big data 159
article thumbnail

Mastering the German Federal Data Protection Act (BDSG-New): A Deep Dive

Centraleyes

Employee Data: The Act necessitates written consent for employee data processing unless circumstances justify oral or electronic consent. Consent is obligatory for exceptions, such as using an employee’s photo in marketing materials, potentially requiring amendments to works agreements.

article thumbnail

GUEST ESSAY: Here’s why managed security services — MSS and MSSP — are catching on

The Last Watchdog

Here’s more on the various types and benefits of MSS, as well as the state of the MSS(P) market in 2022! The current unification in the cybersecurity market is driving a massive movement towards fewer vendors, which at the same time means more polarization of either using MSS/MSSP or doing the security work internally. MSSPs in 2022.

Marketing 247
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

In the past, it’s been much more lucrative for the attacker to attack the supply chain on the distribution side, to go after targeted machines in targeted markets to lessen the exposure of this activity.