Online sports retailer Sports Warehouse has agreed overhaul its security program and pay a $300,000 fine to New York State after hackers stole 20 years' worth of payment card data and customer information the company was storing in plaintext on its e-commerce server.
With data distributed across multiple clouds serving an increasingly remote workforce, can existing data protection programs truly be successful? Most data protection solutions have been built on a foundation of legacy technologies and operations that only drive up complexity and costs.
A best-in-class data...
The expanding RTP landscape represents a definitive transformation in how consumers and organizations interact.
Constantly evolving payments demand agile tools, practices and processes that enable greater defense against continually manifesting scams and fraud. The FedNow Service launch is right around the...
Ransomware attacks grew by 80% last year, according to Zscaler's ThreatLabz findings. Further, phishing attacks increased by 47%.
In the wake of recent high-profile data breaches in Australia, the global threat landscape is top of mind for everyone from Anthony Albanese to your next-door neighbors. The pressure is...
IBM has bought a startup founded by a longtime security leader in the Israeli Prime Minister's Office to ensure personal identifiable information isn't left unprotected. The deal will ensure sensitive data isn't exposed in public cloud data stores or SaaS apps like Slack, SharePoint or Office 365.
Did you know that the onset of COVID-19 has fast-tracked the trend of mobile-first banking? This means that it's more important than ever for banks to have robust cybersecurity measures in place to protect their customers.
Here are three things you'll learn when you download our whitepaper:
Current mobile...
Many organizations struggle to develop an effective data loss prevention program, viewing success as unattainable. Security and risk management leaders must focus on business objectives, identify data risk factors, decrease DLP violations and address areas of stakeholder frustration.
Download for more insights on...
In recent months, several high profile incidents, including breaches at Uber, Twitter, and LastPass, have highlighted just how vulnerable cloud data stores can be – even for organizations that ostensibly understand cybersecurity and invest heavily in data protection. The common thread is lack of visibility.
As...
A renaissance around data protection has taken advantage of artificial intelligence and machine learning to boost data classification and governance, said Forcepoint CEO Manny Rivelo. Advances in areas like generative AI allow hackers to form sophisticated attacks that evade defenses like sandboxes.
OpenText, Varonis and Forcepoint joined Google and Microsoft atop Forrester's data security rankings, while Trellix and Broadcom fell from the leaders category. Data protection historically focused on delivering security controls, but firms are increasingly looking to address adjacent use cases.
The sheer volume of federal regulations in place makes it almost impossible for agencies to monitor and comply with all of them, much less understand the impact of new ones. Nick Graham of Skyhigh Security explores the many compliance challenges - and how to overcome them.
Creating a culture of cybersecurity across a healthcare enterprise can be challenging, but it’s critical to patient safety. The days of leaving cybersecurity solely on the shoulders of IT departments are long gone as purchasing decisions get made by department heads across the organization, many of which include...
When you think of using biometric technology as part of your multi-factor authentication process, you assume these attributes are safe. Cybercriminals can’t hack your fingerprints, can they? The answer may surprise you!
Biometric attributes aren’t as safe as they once were. Cybercriminals are always coming up...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.