article thumbnail

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration.

Security Affairs

The National Cyber Security Centre (NCSC) published a data analysis report on the data breach resulting from the ransomware attack on the IT services provider Xplain. The attack took place on May 23, 2023 and the Play ransomware gang claimed responsibility for the data breach. ” reads the report.

article thumbnail

GUEST ESSAY: How stricter data privacy laws have redefined the ‘filing’ of our personal data

The Last Watchdog

Filing systems, historically speaking, have been all about helping its users find information quickly. Europe’s General Data Protection Regulations (GDPR) changed the game. This is an important capability for organizations who need to satisfy this new type data handling regulations. Related: GDPR and the new privacy paradigm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DCAP Systems: Protecting Your Data with Advanced Technology

SecureWorld News

One of the most important responsibilities of security professionals is to avoid data breaches. At the same time, the IBM report reveals that it takes an average of 277 days to detect and contain a data breach. Analysts from Gartner introduced a specific concept known as Data-Centric Audit and Protection ( DCAP ).

article thumbnail

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at Starwood Hotels and Quora. Related podcast: The need to lock down unstructured data. What exactly makes data sensitive? Practicing good data governance is easier than you think.

article thumbnail

CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack

Malwarebytes

Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group using Phoenix CryptoLocker ransomware, issued a legal notice of an information security incident to the Consumer Protection Bureau in New Hampshire. Phoenix posed as a browser update. Recovering from ransomware.

article thumbnail

Best 5 Privacy Management Tools for 2024

Centraleyes

High-profile data breaches have made data protection and privacy a hot subject. Hackers use more sophisticated methods to break network defenses and steal sensitive data on a large scale. Malicious actors target personal data because of its value. The consequences of data breaches go beyond financial impact.

article thumbnail

Key steps on the road to LGPD compliance

Thales Cloud Protection & Licensing

This means that it is not just Brazilian citizens whose personal information is protected, but any individual whose data has been collected or processed while inside Brazil. As with any data privacy regulation, any organization subject to LGPD should focus on four key steps: Visibility: you can't analyze what you can't see.