Remove Architecture Remove Big data Remove Social Engineering
article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Unsurprisingly, cyberattacks and data breaches show no signs of slowing as companies invest in technology to fuel growth, enhance customer experiences, support remote and hybrid workforces, and meet ESG goals. Here are my predictions for 2023. Types of attacks. Sustainability. More companies will be focused on sustainability.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Privacy and Data Protection: Explore techniques and frameworks for protecting personal information and ensuring compliance with privacy regulations. Investigate topics such as privacy-preserving data mining, secure data sharing, and the impact of emerging technologies like artificial intelligence and big data analytics on individual privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fintech Cybersecurity Trends in 2021

Security Boulevard

When the pandemic struck, online bad actors took it as an opportunity to double-down on their attacks through ransomware, malware, and social engineering. SASE network architecture, like multi-cloud storage, brings multiple systems together to link security solutions for the greatest effect. Article by Beau Peters.

article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Thales Cloud Protection & Licensing

In 2023, 74% of all breaches include the human element, meaning people were involved through mistakes, misuse of privileges, use of stolen credentials, or social engineering tactics. This includes legacy repositories deep in the architecture and new ones, in on-premises and cloud-managed environments.

Retail 71
article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Security Boulevard

In 2023, 74% of all breaches include the human element, meaning people were involved through mistakes, misuse of privileges, use of stolen credentials, or social engineering tactics. This includes legacy repositories deep in the architecture and new ones, in on-premises and cloud-managed environments.

Retail 64
article thumbnail

Maximizing Cloud Data Security: Importance, Challenges and Best Practices

Centraleyes

In the era of big data , companies generate and store vast amounts of information. This data takes many forms, ranging from highly confidential data to less sensitive analytics. Cloud services offer many advantages for data management, including scalability, cost efficiency, and enhanced collaboration.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Ricardo Villadiego, founder & CEO of Lumu , expects “a significant shift towards adopting models based on passwordless architectures like Google Passkeys as the dominant authentication method to combat phishing and scam campaigns.