article thumbnail

For Whom the Dell Tolls: Data Breach Affects 49 Million Customers

SecureWorld News

Dell, one of the world's largest technology companies, has just disclosed a major data breach that may have compromised the personal information of tens of millions of current and former customers. The breach went undetected for several months before finally being discovered in early 2023.

article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

•Social security number •Passport number •Driver’s license •Credit card information •Biometric data (fingerprint, eye scan, facial recognition data) •Health records Bruggeman When demographic information and sensitive information are combined and then inappropriately disclosed, you end up with a data disclosure incident or a data breach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy

CyberSecurity Insiders

Zero trust emphasizes the importance of micro-segmentation, multi-factor authentication, encryption, and monitoring of user behavior to prevent lateral movement within the network and detect and respond to potential threats in real time. Importance for CISOs and CIOs Zero trust is no longer just a buzzword for CISOs and CIOs.

CISO 87
article thumbnail

GUEST ESSAY: 7 tips for protecting investor data when it comes to alternative asset trading

The Last Watchdog

•Implement strong data encryption. Data encryption is fundamental for protecting sensitive information in alternative asset trading. Industry-standard algorithms for encryption can ensure all data, in transit and at rest, is safe. Prioritize continuous threat detection.

article thumbnail

Cyber Insurance Costs Soaring: Is Your Organization Covered Enough?

SecureWorld News

In this digital battlefield, cyber insurance has emerged as a crucial shield, offering financial protection against data breaches, ransomware attacks, and other cyber incidents. Cybersecurity threats are a growing menace, wreaking havoc on businesses and individuals alike. 6 billion by 2033, according to a recent report from Market.us

article thumbnail

Securing the Cloud Frontier: Navigating the Complexities of SaaS Data Protection in the Multi-Cloud Era

Thales Cloud Protection & Licensing

Over 39% of enterprises have experienced a data breach in their cloud environment, predominantly due to the increased surface area and operational complexities of managing multiple platforms. A further confirmation of the complexity of data protection management comes from the number of key management systems in use.

article thumbnail

MITRE ResilienCyCon: You Will Be Breached So Be Ready

eSecurity Planet

JupiterOne CISO Sounil Yu, creator of a Cyber Defense Matrix adopted by OWASP, noted the concentration of security products in protection and detection and wondered, “Is our industry actually solving the right problems? The general lack of focus on resilience, response and recovery is largely reflected in vendor offerings too.

Backups 115