Remove Data breaches Remove Identity Theft Remove InfoSec
article thumbnail

The State of Data Breaches

Troy Hunt

I've been harbouring some thoughts about the state of data breaches over recent months, and I feel they've finally manifested themselves into a cohesive enough story to write down. Data Breach Victims are Making it Worse I'm talking about class actions.

article thumbnail

Inside the Massive Alleged AT&T Data Breach

Troy Hunt

So, let's focus on what we can prove, starting with the accuracy of the data. The linked article talks about the author verifying the data with various people he knows, as well as other well-known infosec identities verifying its accuracy. For my part, I've got 4.8M

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter.

article thumbnail

World Password Day and the importance of password integrity

Webroot

That’s why maintaining password integrity helps protect our online lives and reduces the risk of becoming a victim of identity theft or data loss. The average cost of a data breach in 2021 rose to over 4 million dollars , increasing 10% from 2020. What is password integrity? Think of the foundation of a building.

Passwords 131
article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

Regulations galore Against this backdrop, there are myriad global data protection regulations. The EU's General Data Protection Regulation (GDPR) is widely considered the de facto gold standard. Also, the GDPR recommends data anonymization to minimize the risk of PII breach and identity theft.

IoT 109
article thumbnail

Authentication is Outdated: A New Approach to Identification

CyberSecurity Insiders

Identity security is the greatest weakness in enterprise security. As any infosec manager will tell you, no matter how secure your infrastructure, anyone with the right credentials can walk through the front door. Identity and user authentication continue to be a concern for IT managers.