article thumbnail

GUEST ESSAY: Going beyond watermarks to protect sensitive documents from illegal access

The Last Watchdog

Cyber threats continue to gain momentum and there are still not enough ways to counter it. Related: Why the ‘Golden Age’ of cyber espionage is upon us. The global threat intelligence market size was estimated at $10.9 Second, it interferes with reading the content of the document itself. Demyanchuk.

Marketing 279
article thumbnail

The March Madness Cyber Threat

Adam Levin

Use online or cloud-based office software for non-sensitive documents. It’s just as easy to access a brackets spreadsheet or document through Google Docs or Microsoft Office as it is to send an email attachment, and it poses less of a cyber risk. The post The March Madness Cyber Threat appeared first on Adam Levin.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

As organizations continue facing escalating cyber threats, how they communicate multiplying and rapidly morphing cyber exposures – in essence how much they choose to abide by industry standards and embrace ethical practices — remains under intense scrutiny. There is only one path forward: transparency.

CISO 263
article thumbnail

Cyber Threats Observatory Gets Improvements

Security Affairs

Today I am so happy to announce a big improvement in the cyber threats observatory (available for here ). Screenshot Cyber Threats Observatory ( HERE ). According to shared information, the Cyber Threats Observatory Dashboard is composed by the following sections: Malware Families Trends. What you find.

article thumbnail

Video: 2.9 Billion Records Compromised in NPD Breach – Recap

eSecurity Planet

Join us as we discuss actionable steps individuals and organizations can take to enhance their security in light of growing cyber threats. NPD is a company that specializes in background checks, pulling data from public records, court documents, and more. Transcript 2.9 How safe is your information?

article thumbnail

Leaked Documents Reveal China's State-Sponsored Hacking Operations

SecureWorld News

Recently leaked documents from Chinese cybersecurity firm i-SOON provide an unprecedented look at China's extensive state-sponsored hacking operations. Targets listed in the documents span Central and Southeast Asia, Hong Kong, and Taiwan. The specifics of the leaked capabilities that directly relate to these or other U.S. government."

Hacking 112
article thumbnail

FBI Analyst Charged With Stealing Counterterrorism and Cyber Threat Info

The Hacker News

Department of Justice (DoJ) indicted an employee of the Federal Bureau of Investigation (FBI) for illegally removing numerous national security documents and willfully retaining them at her personal residence during a 13-year period from June 2004 to December 2017.