Remove Blog Remove Data breaches Remove Threat Detection
article thumbnail

Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout

eSecurity Planet

Crypto giant Coinbase is grappling with one of its most serious security challenges to date: An insider-led data breach that has shaken customer trust and could cost the company as much as $400 million. Increased investment in insider threat detection. What was stolen? Masked Social Security numbers (last four digits).

article thumbnail

Unanswered Questions Loom Over Cyber Attacks on M&S, Co-op & Harrods

Jane Frankland

That’s what this blog is all about, In it, I’m examining the changing landscape of cyber threats, looking first at the M&S cyber attack. On one hand, AI enhances security by enabling faster threat detection, predictive analytics, and automated responses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial Intelligence meets real talk at IRISSCON 2024

BH Consulting

Leaders guiding their organisations today need to know how to balance AI’s benefits – like real-time threat detection, rapid response, and automated defences – with new risks and complexities.

article thumbnail

Shadow AI: The Hidden Threat Lurking in Your Cloud Subscriptions—and How to Fight It

Responsible Cyber

A developer might use an unapproved AI coding assistant to speed up a project, or a sales rep might feed customer data into a free CRM AI tool, unaware that it lacks GDPR compliance. Data breaches, compliance violations, and operational chaoscosting enterprises an average of $4.45 The result?

article thumbnail

Security Roundup April 2025

BH Consulting

Third-party risk rises as a factor in breaches: Verizon DBIR 2025 Verizons latest annual Data Breach Investigations Report (DBIR) shows some concerning trends with a sharp escalation in global cyber threats. Verizon itself noted a recurring theme of the role that third-party relationships play in breaches.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. This is where the real opportunity lies, and what Im exploring in this blog.

CISO 130
article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Insider Threats as a Growing Concern Insider threats represent one of the most underestimated vectors in this evolving landscape.