Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

How to Protect Your Personal Data: Three Privacy Tips To Stay Ahead

Technology has advanced our world in countless ways. Every day we bank, shop, conduct business, and exchange photos and messages with family and friends online. While digital devices and services offer great convenience, they also pose risks to our data and privacy as our offline and online lives converge. In 2021, data breaches reached an all-time high of 1,862, according to the Identity Theft Resource Center (ITRC), a 68% increase over 2020.

Move On Up: Applying Zero Trust Design to the Office

Moving to a new home is listed as one of the main stressors in life. When organizations switch offices to accommodate business needs, moving can also be a major stressor for IT teams — but it doesn’t need to be. Not too long ago we moved our Boston office to a new location, one of our major engineering hubs, where many of our engineers and IT members work.

Uber Data Breach 2022: What You Need to Know

The world of digital security has been under the spotlight for various reasons in the last year. Several high-profile incidents have directly impacted the general public, from cyber attacks to privacy scandals. Uber is the latest company to be caught up in this whirlwind after hackers managed to breach their security and steal sensitive user data from the ride-hailing service. This article provides an overview of what happened, what went wrong, and what you can do to keep your accounts safe.

Lookout Expands Partnership with Cloud Security Platform to deliver SSE to Verizon Business Customers

With nearly every organization going through rapid digital transformations, it has become critical that security teams are equipped to provide seamless access for their remote users while keeping sensitive data secure. This is why I’m thrilled that Verizon has launched the Lookout suite of cloud security solutions to deliver security service edge (SSE) and ensure that customers can seamlessly secure their data and apps in the cloud, on premises and on the internet.

Protect Sensitive Data When Working With Partners and Contractors

The Lookout security platform allows users to successfully collaborate with partners and vendors while keeping confidential information secure. With data loss prevention and dynamic digital rights management, users can securely collaborate with tools like Microsoft Teams, Slack, and email.

Cyber Attack on IHG Disrupts Hotel Booking System | Concerns on Private Data Leakage

IHG Hotels & Resorts, the hotel group that owns the Holiday Inn and Intercontinental brands, experienced a cyber attack in the first week of September. The attack has impacted the central hotel’s booking system and mobile apps, causing a service outage for several days. Loyalty program members could not log in or create new bookings during this time.

Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London

After a two-year hiatus, the Gartner Security and Risk Management, London is back! I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies, including the Top Cybersecurity Predictions for 2022-2023 from Gartner. Two themes that stood out to me were security service edge (SSE) and extended detection and response (XDR) Below are some of my key takeaways from this year’s conference.

CyRC Vulnerability Advisory: Denial-of-service vulnerabilities (CVE-2022-39063) in Open5GS

CVE-2022-39063 is a vulnerability in the Open5GS project, an open source implementation of 5G components. The Synopsys Cybersecurity Research Center (CyRC) has exposed a denial-of-service vulnerability in Open5GS. Open5GS is an open source project that provides LTE and 5G mobile packet core network functionalities with an AGPLv3 or commercial license. It can be used to build private LTE/5G telecom networks by individuals or telecom network operators.

Why Your Cloud Migration Is Causing Security Risk

You've migrated to the cloud, which has made you more efficient and agile. But this comes with new security challenges. Your data is outside your corporate network: In public clouds, on personal devices, on unsanctioned apps, and handled by networks you don't own. The more spread out your data is, the less visibility and control you have.