All Data Breach articles
-
Webinar
How Financial Services Companies Can Protect Themselves Against Financial Crime
Webinar produced by GRC World Forums in association with Exterro
-
News
Cloud data breaches caused mostly by human error
A report has identified human error as one of the main causes of cloud infrastructure data breaches.
-
News
Chatbot “prompt injection” risk issued by NCSC
Anxieties are now arising from the fact that chatbots interact with third-party applications and services, making them susceptible to malicious prompt injection.
-
News
Japan’s cybersecurity data breach a stark reminder of global cyber risk
Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) has suffered a major cyberattack that went undetected for about nine months, potentially exposing sensitive data.
-
News
Massive data breach from US software firm exposes millions globally
A significant cybersecurity breach originating from a single American software maker has left a trail of exposure across more than 600 organisations worldwide, raising concerns about data security and digital privacy.
-
Webinar
Why Healthcare Organizations Need Modern IAM Solutions
Webinar produced by GRC World Forums in association with ManageEngine
-
Webinar
How Financial Services Companies Can Protect Themselves Against Financial Crime
Webinar produced by GRC World Forums in association with Exterro
-
Webinar
What Comes Next After A Data Breach
While the global average cost of a data breach has increased to $4.24 million, the total cost isn’t just in data loss alone.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Analysis
Cash App Data Breach Exposes Over 8-Million Customers
Often when we think of data breaches, we think of external cyber threat actors utilizing ransomware to make a profit. We rarely think that our own employees could be the culprit of a massive data breach.
-
ebook
Executive Summary: ICS/OT Cybersecurity Year In Review 2021
Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 ICS/OT Year in Review.
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
News
Hacker deletes 69K hospital patient files
San Juan Regional Medical Center in Farmington, New Mexico has begun notifying nearly 69,000 patients about a malware attack that exposed their personal health information.
-
News
Pacific City Bank confirms ransomware attack
Pacific City Bank, one of the largest Korean-American community banking service providers in America has confirmed that it was the victim of a ransomware attack.