fines
-
How to Protect Patients and Their Privacy in Your SaaS Apps
The healthcare industry is under a constant barrage of cyberattacks. It has traditionally been one of the most frequently targeted…
Read More » -
Owner of BreachForums Pleads Guilty to Cybercrime and Child Pornography Charges
Conor Brian Fitzpatrick, the owner of the now-defunct BreachForums website, has pleaded guilty to charges related to his operation of…
Read More » -
5 Things CISOs Need to Know About Securing OT Environments
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself.…
Read More » -
Microsoft to Pay $20 Million Penalty for Illegally Collecting Kids’ Data on Xbox
Microsoft has agreed to pay a penalty of $20 million to settle U.S. Federal Trade Commission (FTC) charges that the…
Read More » -
Chinese PostalFurious Gang Strikes UAE Users with Sneaky SMS Phishing Scheme
A Chinese-speaking phishing gang dubbed PostalFurious has been linked to a new SMS campaign that’s targeting users in the U.A.E.…
Read More » -
Why Telecoms Struggle with SaaS Security
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive…
Read More » -
14 Kubernetes and Cloud Security Challenges and How to Solve Them
Recently, Andrew Martin, founder and CEO of ControlPlane, released a report entitled Cloud Native and Kubernetes Security Predictions 2023. These…
Read More » -
Italian Watchdog Bans OpenAI’s ChatGPT Over Data Protection Concerns
The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a temporary ban of…
Read More » -
Breaking the Security “Black Box” in DBs, Data Warehouses and Data Lakes
Security teams typically have great visibility over most areas, for example, the corporate network, endpoints, servers, and cloud infrastructure. They…
Read More » -
Is Once-Yearly Pen Testing Enough for Your Organization?
Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a…
Read More »