Turning Malware Trends into Proactive Behaviors
Most of the industry agrees: malware is on the rise. My news feed rarely manages a week without an incident making the headlines. Here are some of the most recent events I’ve seen...
Most of the industry agrees: malware is on the rise. My news feed rarely manages a week without an incident making the headlines. Here are some of the most recent events I’ve seen...
We’re constantly reminded of just how much data impacts our lives, from influencing elections around the world to monitoring employees at work. But there are many more situations we rarely hear about, like the competitors in the Esport championships using data to win a multi-million dollar prize. As technology writer Andrew Wooden puts it, “data has become, quite literally, a game changer.”
The use of big data and data from the internet of things (IoT) is changing business so rapidly it is hard to predict what is next, and financial analytics are certainly no exception. While the need for financial analysts continues to rise, the way analysts performs their day-to-day functions is evolving.
Your primary systems aren’t the only source of damaging exposed credentials. Third-party applications employed by your organization also have privileged logins that must be protected. Cloud platforms, software as a service (SaaS), and local third party applications such as ERP systems often have administrative logins with full control.
UpGuard’s researchers regularly uncover and report on corporate data breaches. We often find that the breach is not directly caused by the company, but by one of their third-party vendors. This series of posts is about a less-understood aspect of vendor risk, data breaches by third-party vendors. We will run you through many types of data breaches, how they relate to your third-party vendors, and ultimately what you can do to prevent them from hurting your business.
May 25, 2018 was the deadline for GDPR compliance. The media was abuzz. Businesses were rushing to update their privacy policy page. Companies were emailing newsletter subscribers to approve updated privacy policies. Everybody seemed to be paying attention to this new law, which appeared to be the beginning of a new dawn in data privacy. Or was it?
Pundits have been talking about ‘digital transformation’ since at least 1999, but it is a difficult concept to pin down, much less execute. Yet in a business environment in which former market leaders like Sears and GE are failing the challenge, the need for transformation has never been so stark.
A selection of this week’s more interesting vulnerability disclosures and cyber security news. Another week of quite astounding news, and I will lead with a really interesting story from a side where many of us don’t get to tread (perhaps thankfully), though his closing question is very disconcerting…
When election interference is discussed, you probably think of “fake news” social media plots or hacked voting machines that manipulated outcomes. The truth is much more complicated. Election interference can come in many forms and have consequences that last long after an election cycle. Fortunately there are security measures elected officials, campaigns, and anyone with access to voter information can – and should – take to defend against election interference.