Remove Accountability Remove Architecture Remove Data breaches Remove Identity Theft
article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

TMobile has now issued a formal apology and offered free identity theft recovery services to nearly 48 million customers for whom the telecom giant failed to protect their sensitive personal information. Chris Clements, VP of Solutions Architecture, Cerberus Sentinel. For T-Mobile, this is the sixth major breach since 2018.

Mobile 306
article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

Regulations galore Against this backdrop, there are myriad global data protection regulations. The EU's General Data Protection Regulation (GDPR) is widely considered the de facto gold standard. The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs.

IoT 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top of Mind Security Insights from In-Person Interactions

Cisco Security

Hybrid work is here to stay, hybrid and complex architectures will continue to be a reality for most organizations and that has dramatically expanded the threat surface. Insider cyber-attacks are among the fastest growing threats in the modern security network, an increasingly common cause of data breaches.

article thumbnail

Myrocket HR platform’s data leak turns into privacy nightmare for employees

Security Affairs

Researchers warn that such data leaks are hazardous as they might help threat actors craft targeted phishing campaigns, assist in forgery and identity theft, and trick companies into making payments. Treasure trove of data. The company said the issue was caused by a misconfiguration and fixed the issue upon notification.

article thumbnail

Fintech Cybersecurity Trends in 2021

Security Boulevard

With 2020 being the worst year on record in terms of files exposed in data breaches , a thorough security approach is necessary to combat modern dangers. Luckily, new tech trends could help keep our financial data safe even with an increase in risk. Fintech relies on cybersafety more than any other digital platform.

article thumbnail

Top Data Loss Prevention (DLP) Solutions

eSecurity Planet

Sensitive data can include personally identifiable information (PII) that can impact user privacy. Sensitive data also includes payment and financial information that could lead to identity theft and fraud if the data is lost or stolen and winds up in the wrong hands. Key DLP Trends. How to choose a DLP solution.

Backups 125
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter.