One Identity selected ex-LogRhythm CEO Mark Logan as its next leader and tasked him with standing the Quest subsidiary up as a stand-alone entity. The company offers identity governance, privileged access, identity management and Active Directory management solutions thanks to buying OneLogin.
U.S. federal regulators are revamping their approach to oil pipeline cybersecurity by telling operators they have newfound latitude so long as they implement continuous monitoring and test their posture. Pipeline cybersecurity became a priority after a 2021 ransomware attack led to gas shortages.
Ride-sharing service Uber has reached an agreement with the U.S. Department of Justice to resolve a criminal investigation into its massive 2016 data breach. After Uber admitting to covering up the data breach, as well as several other factors, the government has ended its prosecution.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
A scan of Russian servers led researchers to follow a trail of digital breadcrumbs to find a server with "smoking gun" evidence of connection to MedusaLocker ransomware. The malware has especially affected the healthcare industry. Attack surface risk firm Censys detailed its findings in a report.
A proposed $350 million settlement of a consolidated class action lawsuit against T-Mobile, after a 2021 data breach that affected nearly 77 million people, includes breach victims and related legal costs. The settlement requires T-Mobile to invest $150 million to bolster data security.
SonicWall promoted its chief revenue officer to CEO, tasking him with accelerating cloud transformation, expanding enterprise coverage and enabling managed service providers. SonicWall credits Bob VanKirk with producing eight consecutive quarters of double-digit top-line and bottom-line growth.
The basic foundation of designing a reliable and dynamic cyber resilience program is to have an elaborate incident response plan that can take into account different cyberthreat scenarios and outcomes, says Singapore-based Christophe Barel, who is managing director for Asia-Pacific at FS-ISAC.
Compromised logon credentials are the root cause of most data breaches, especially because users tend to reuse passwords, says Vikas Malhotra. Passwords are not going anywhere, he says. The LastPass India country manager also discusses password management and managing identities.
Ransomware operators, crypto miners and initial access brokers are increasingly targeting the same networks for compromise, creating a new set of challenges for defenders. Sophos has brought together three teams of cybersecurity experts to help businesses defend against changing threats.
The company ePlus has purchased Future Com to strengthen its security operations strategy and support of managed services. The deal will allow ePlus to help customers evolve their security operations teams from correlating and analyzing logs to delivering advanced capabilities like threat hunting.
A cybersecurity incident at popular Indian online travel website Cleartrip may have put at risk customer PII, including names, email addresses and phone numbers. Cleartrip is part of Walmart-controlled e-commerce firm Flipkart. "Appropriate legal action and recourse are being evaluated," it says
The Identity Theft Resource Center's data breach report for the first half of 2022 says approximately 40% of data breach notices do not list the root cause of the compromise. "Unknown" is the top cause of data breaches for the first time since the ITRC began tracking their causes.
Incognia has recently published an Insights Report on novel fraud schemes using location spoofing to target delivery apps. But why is location spoofing so important?
Fraudsters spoof their location to take advantage of location-based services to swindle trusted users, food delivery companies, restaurants, gamers...
Do you know just how susceptible you really are to location spoofing?
When using the leading location-based mobile apps in food delivery, gambling & gaming, ride-hailing and dating categories you open yourself up to a world of spoofers, fraudsters and swindlers.
Location-based apps rely on location data shared...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.