Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Data Exposure Types: System Information

There are many different kinds of sensitive data that can be exposed, each with its own particular exploits and consequences. This article will focus on what we have categorized as “systems information,” data that describes digital operations, such as systems inventory, configuration details, data center and cloud design, performance metrics and analyses, application code, and IT business data, such as equipment spend, vendor discount, and budgeting.

The Dangers of Publicly Writable Storage

During the course of UpGuard’s cyber risk research, we uncover many assets that are publicly readable: cloud storage, file synchronization services, code repositories, and more. Most data exposures occur because of publicly readable assets, where sensitive and confidential data is leaked to the internet at large by way of a permissions misconfiguration.

Why Do Cloud Leaks Matter?

Previously we introduced the concept of cloud leaks, and then examined how they happen. Now we’ll take a look at why they matter. To understand the consequences of cloud leaks for the organizations involved, we should first take a close look at exactly what it is that’s being leaked. Then we can examine some of the traditional ways information has been exploited, as well as some new and future threats such data exposures pose.

Can Fast Food be Bad For Cybersecurity?

No, we aren't talking about your burger-inhaling operator passing out on the job, leaving your precious IT assets unattended. You've probably guessed that we're referring to the latest Wendy's data breach announcement: on June 9th, the international fast food chain disclosed that its January 2016 security compromise was, in fact, a lot worse than originally stated—potentially eclipsing the Home Depot and Target data breaches.

Systema Systems' Data Exposure and Cloud Security For The Insurance Industry

The insurance industry has been consistently targeted for cyber attacks as of late, for good reason: sensitive data is at the heart of every process—from handling health insurance claims to archiving medical histories. And because medical records are worth ten times more than credit card information on the black market, firms handling said data are required to take extra precautions in bolstering information security.

Thinking corporate: Bulletproof's first quarterly update

A company’s first few years can often give an indication of where it’s going, allowing us to make assumptions about its future. Bulletproof is still in its early phases, being just a couple of years old, but having been privy to the first official quarterly update, it’s clear that the business has a great deal of potential.

In-Depth Visibility, Increased Awareness and Real-Time Response:LOGSIGN SIEM Is Now Available on the Azure Marketplace

Logsign proudly announces that our customers now have the opportunity to deploy Logsign on the Microsoft Azure cloud platform. As a next-gen, all-in one SIEM solution, Logsign primarily focuses on security intelligence, log management and easier compliance reporting for cloud, physical and virtual environments. In addition, Logsign unifies the view and monitoring of cloud and on-premises environments, and increases awareness via smartly designed, security-oriented dashboards.