Read the original article: Zoom in Crisis: How to Respond and Manage Product Security Incidents Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy,…
CCPA privacy requests cost business up to $275k per million consumer records
Read the original article: CCPA privacy requests cost business up to $275k per million consumer records Organizations who plan on manually processing CCPA data subject requests (DSRs) or data subject access requests will spend between $140k – $275k per million…
Protecting corporate data in popular cloud-based collaborative apps
Read the original article: Protecting corporate data in popular cloud-based collaborative apps Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business demands. Additionally, migrating…
Why cybersecurity needs a seat at the table
Read the original article: Why cybersecurity needs a seat at the table Introduction A shift has occurred in the bastion of corporate hierarchy in the last few decades that has fundamentally changed how organizations operate. This shift started about sixteen…
Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences
Read the original article: Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences In episode 119 for May 4th 2020: The use of thermal cameras and other technology to monitor the workplace for COVID-19, more details about Apple…
Bitglass adds APAC Local Edge Data Centers
Read the original article: Bitglass adds APAC Local Edge Data Centers May 4, 2020, Singapore: Bitglass is pleased to announce Local Edge Data centers in Kuala Lumpur, Malaysia; Osaka, Japan; Seoul, South Korea; Singapore; Taipei, Taiwan and Tokyo, Japan The post…
Despite spending more on compliance, businesses still have basic IT weaknesses
Read the original article: Despite spending more on compliance, businesses still have basic IT weaknesses There is a misalignment between data privacy regulation spending and business outcomes, according to a Tanium research. Specifically, as businesses spend tens of millions on…
Consumers will opt for competitors after a single ransomware-related service disruption
Read the original article: Consumers will opt for competitors after a single ransomware-related service disruption While most consumers are taking necessary security precautions to protect their online accounts, businesses may not be doing enough to protect their information – inadvertently…
Hackers Breached MDM Servers to Install Banking Malware on Android Devices
Read the original article: Hackers Breached MDM Servers to Install Banking Malware on Android Devices Security researchers uncovered that hackers had breached at least 75% of the MDM (Mobile Device Manager) server to install banking malware on Android devices in…
India orders mandatory use of COVID-19 contact tracing app for all workers
Read the original article: India orders mandatory use of COVID-19 contact tracing app for all workers The heads of organisations will be responsible for ensuring that employees install the app. Advertise on IT Security News. Read the original article:…
Is Cyber Bullying Just Kids Being Mean On Social Media, Or Is There More To It?
Read the original article: Is Cyber Bullying Just Kids Being Mean On Social Media, Or Is There More To It? Whilst there are many definitions out there, to me cyberbullying is any form of communication that is aimed at hurting…

ZIP & AES, (Sun, May 3rd)
Read the original article: 
ZIP & AES, (Sun, May 3rd) A comment on my diary entry “MALWARE Bazaar” mentioned problems with the ZIP password of downloaded samples (MALWARE Bazaar is a free service were you can download malware samples). …