Tag: EN

Data Breaches in October 2023 – Infographic

A data breach is a security incident where sensitive data is accessed, used, or disclosed without the permission of the data subject. Data breaches can occur in organizations of all sizes and industries, and can have a significant impact on…

HITRUST vs. HIPAA: Ensuring Data Security and Compliance

While both HITRUST and HIPAA have substantial relevance in ensuring data security in the healthcare sector, they are very different standards. HIPAA, or the Health Insurance Portability and Accountability Act of 1996, is a federal law, whereas HITRUST is a…

Be careful if you use Apple’s Find My network

Apple’s “Find My” network is a powerful tool that can help users locate their lost or stolen devices. It works by using a combination of GPS and Bluetooth signals from other Apple […] Thank you for being a Ghacks reader.…

How global password practices are changing

Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses, according to Dashlane. Password reuse remains prevalent, however, leaving user accounts particularly vulnerable to password-spraying attacks if they’re not protected…

Cyber Attack news headlines trending on Google

1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…

Securing data at the intersection of the CISO and CDO

Two groups in particular play a key and critical role in ensuring data governance and security: the CISO and the CDO. CISOs are responsible for identifying and managing risks associated with data security, while CDOs are responsible for ensuring data…

The roadblocks to preventive cybersecurity success

In the last two years, the average organization’s cybersecurity program was prepared to defend preventively, or block, just 57% of the cyberattacks it encountered, according to Tenable. This means 43% of attacks launched against them are successful and must be…

The perils of over-reliance on single cloud providers

The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging risks for organizations for the second consecutive quarter, according to a survey by Gartner. Emerging risks In September 2023, Gartner…

The role of Kubernetes in modern app management

Kubernetes, often abbreviated as K8s, is an open-source container orchestration platform that has redefined the way modern applications are developed, deployed, and managed. Born out of Google’s internal container orchestration system, Kubernetes has become the de facto standard for containerized…