Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Decathlon Partner Data Breach from 2021 Returns with 8,000+ Exposures

Decathlon is a global sporting goods retailer with over 100,000 employees and 1,700+ storefronts worldwide. In 2022, Decathlon reported 15.4 billion euros of net sales revenue, shared with 55,000 shareholding teammates. However, Decathlon suffered a significant data leak a year before its substantial revenue report. Credentials from that attack have resurfaced recently, putting the private information of nearly 8,000 individuals at risk.

Healthcare Systems Remain Prime Target for Cybercriminals

In mid-August, state officials in Connecticut began receiving worrisome complaints from constituents about a potentially dire situation unfolding at local hospitals. One such message, from a woman on Facebook, relayed a desperate plea for help on behalf of her 71-year-old father, who, she claimed, had spent the last two days on a gurney in an emergency room hallway.

Healthcare IT: Improving Patient Care and Satisfaction with SD-WAN

The phrase “digital transformation” gets thrown around a lot these days when discussing IT infrastructure. A popular — albeit slightly vague — buzzphrase for a reason, digital transformation, in this context, simply refers to the idea that businesses are working to modernize their operations and leverage the power of new technologies.

£20 Million Cyber Insurance or £5 Million Cybersecurity?

We delve into the complex world of cyber insurance and the staggering premiums associated with securing a £20 million policy for just one year. Join us as we discuss the astronomical costs and the limitations of cyber insurance in the face of growing cyber threats. Is it more practical to invest in comprehensive cybersecurity measures?

New ESG Research Report Outlines Best Practices for Effective Application Security Programs

New research from TechTarget’s Enterprise Strategy Group (ESG) has identified that organizations’ application security programs struggle to keep up with the pace of software development, and it reveals best practices to secure modern software applications.

Random but Memorable - Episode 11.6: Private Electronic Graffiti Tags with Graham Cluley

How has the cybersecurity landscape changed since the days of the floppy-disc? 💾 This week, we sit down with Smashing Security's Graham Cluley, to reflect on how threats have evolved. Graham also dishes his top security tips and explains why celebrating infamous hackers angers him. 🤬 Tune in for our favorite ways to use tags with 1Password in Did You Know? Plus, Roo hosts HackerNoHacker for a Matt vs Sara showdown. 🥊💥

CISA KEV Ransomware Interactive Visualization

When we first built the CISA KEV enrichment dashboard at Nucleus, our goal was to gain new insights into the vulnerabilities that had been confirmed by CISA as being exploited. Recently, CISA expanded the Known Exploited Vulnerabilities Catalog with vulnerabilities “known to be used in ransomware campaigns”. We find this data valuable in helping organizations identify which vulnerabilities on the KEV pose greater risk.

What Is Security Posture?

In the ever-evolving digital landscape, an organization's security posture stands as a sentinel, guarding against cyber threats and vulnerabilities. But what exactly is a security posture, and why is it crucial for businesses today? This article delves deep into the heart of this matter, unraveling the concept and exploring the essential components that constitute a robust security posture.