article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue. First – The breaches.

article thumbnail

Cactus ransomware gang claims the Schneider Electric hack

Security Affairs

Energy management and industrial automation firm Schneider Electric suffered a data breach after a Cactus ransomware attack. Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric

Security Affairs

Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. At the time, BleepingComputer contacted Schneider Electric which confirmed the data breach.

article thumbnail

Cyber Security Awareness Month: Time to Act and Protect Trust

Thales Cloud Protection & Licensing

Data breaches damage trust. The proliferation of digital has seen us move from bricks and mortar stores and banks to online services. And whilst digital has often improved experiences through its ability to make processes easier, faster, and simpler, this shift has taken us on a rapid trust journey. Time to act.

article thumbnail

Why Data Visibility is Important for Security

Thales Cloud Protection & Licensing

The shift to working from home over the past year, as reviewed in “ 451 Research’s Voice of the Enterprise: Digital Pulse ” published on October 2020, identifies the “information security as the priority respondents cited most often as having become greater”. Data security. Data Breach. Tokenization.

article thumbnail

Researchers analyzed a new JavaScript skimmer used by Magecart threat actors

Security Affairs

“Online shopping activity is constantly on the rise due to its ease of use, digital transformation, and the sheer convenience. Cyble experts noticed that upon executing the JavaScript, it checks if the browser’s dev tool is open to avoid being analyzed. ” concludes the report.

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

Healthcare’s IT evolution has brought numerous security challenges including regulations, the use of digitally transformative technologies that have created huge amounts of data to store and protect, and the extraordinary value of electronic personal health information (ePHI) to cybercriminals.