article thumbnail

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

The Last Watchdog

Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which take full advantage of Big Data, high-velocity software, and automation – inundated the internet in massive surges in 2018 and the first half of 2019, according to multiple reports. But that’s not likely to happen right away.

Big data 164
article thumbnail

Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk

eSecurity Planet

Actually, pretty much all software uses this library written in Java, so it’s a very widespread risk and concern. Zectonal researchers have revealed a new and critically important attack vector that can use the infamous bug: Data pipelines and data lakes. Understanding the Big Data Attack.

Risk 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

International workforces can be an excellent way to find top talent, but they can introduce unique security risks. Inconsistent data regulations. Countries have different data security laws, and these can get in the way of one another. Similarly, different nations exercise varying amounts of authority over internet traffic.

Internet 223
article thumbnail

Annual Reports: How They Warn of Cyber Risk

SecureWorld News

Cyberrisk is business risk. But how should we communicate this risk to the business, to clients, or to investors? Accenture annual report: risks we face from cyberattacks. Accenture featured this earning's news on page 2 in a big, bold font. L egal, reputational and financial risks? billion, a 14% increase in U.S.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. It foreshadowed how encryption would come to be used as a foundation for Internet commerce – by companies and criminals.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

However, as traditional company perimeters are replaced by an array of network infrastructures which include cloud technologies, remote machines and their users (employees and third parties), edge computing and Internet-of-Things (IoT) devices, threats will rise due to a larger attack surface. Approaches.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Yet, API security risks haven’t gotten the attention they deserve. The pursuit of agile software has companies, large and small,at consumed in rapidly developing and tossing into service software meant to function far beyond the perimeters of legacy company networks, in the wide-open Internet cloud.

Big data 240