BreachExchange: by author

340 messages starting May 22 18 and ending May 09 18
Date index | Thread index | Author index


Audrey McNeil

The ethical and legal dilemmas of threat researchers Audrey McNeil (May 22)
Data Breach 911: Six Steps to Take After a Data Compromise Audrey McNeil (Apr 26)
GDPR fines: How high are they, and how can you avoid them? Audrey McNeil (May 08)
What Makes IoT Security so Tough? Audrey McNeil (Jun 14)
Managing PHI Disclosure When a Lawsuit Is Involved—How to Prepare Audrey McNeil (Apr 06)
Organizations Lack Adequate Budget for Medical Device Security Audrey McNeil (Jun 14)
How to protect your startup with IT Audrey McNeil (Apr 12)
6 Tips To Keep Yourself & Co-Workers Safe From Phishing Attacks Audrey McNeil (Apr 30)
TaskRabbit investigates 'cybersecurity incident, ' app taken down Audrey McNeil (Apr 18)
A year on from WannaCry, a new kind of system is needed for security maintenance Audrey McNeil (Jun 12)
Achieving GDPR Compliance with Information Governance Audrey McNeil (Apr 23)
Exposing 145m Equifax customer deets: $240m. Legal fees: $28.9m. Insurance: Priceless Audrey McNeil (Apr 30)
Cybersecurity Vulnerabilities—Why Bad Actors Target HR Departments Audrey McNeil (Jun 25)
Safeguarding data: Are you really prepared for a cyberattack? Audrey McNeil (Apr 04)
Big Data Breaches Shine Spotlight on Laws Impacting Employee Data Protection Audrey McNeil (May 18)
Adidas Says Millions of U.S. Customers Being Alerted of Breach Audrey McNeil (Jun 29)
How to create a cyber security culture in your business Audrey McNeil (Jun 20)
Is GDPR Actually Causing More Data Hacks? Audrey McNeil (Apr 13)
Compliance vs. Cybersecurity - Duking It Out When they Should be Working Together Audrey McNeil (May 04)
FTC Encourages Vendor Contracts to Address Privacy and Security Risks Audrey McNeil (Apr 12)
A Step By Step Guide to Ransomware Disaster Recovery Audrey McNeil (Apr 06)
Preventing physical security devices becoming a cyber-security headache Audrey McNeil (Apr 03)
Under Armour breach exposes the personal data of 150 million people Audrey McNeil (Apr 02)
What We've Got Here is Failure to Communicate! Audrey McNeil (Jun 13)
What to do if a hacker steals your company’s data Audrey McNeil (May 29)
Ten things employers need to know about the General Data Protection Regulation (GDPR) Audrey McNeil (Apr 02)
How Poor Patch Management Can Lead To Cyber Security Risk? Audrey McNeil (Jun 18)
Hospitals are at risk of getting hit with cyber attacks — and patients' lives could be in danger Audrey McNeil (May 11)
Small Business Should Be Concerned About Cyber Security: Now More Than Ever Audrey McNeil (Apr 26)
Russian Hacker Who Allegedly Hacked LinkedIn and Dropbox Extradited to US Audrey McNeil (Apr 03)
Back to basics: Ten Tips for Outsmarting Ransomware Audrey McNeil (Jun 25)
Deleted WHOIS Data: An Unintended Consequence of GDPR Audrey McNeil (May 21)
What US-Based Companies Need to Know About the GDPR, and Why Now? Audrey McNeil (Apr 04)
Healthcare data a growing target for hackers, cybersecurity experts warn Audrey McNeil (Apr 20)
Mandatory Breach Notification Across Canada Audrey McNeil (Apr 10)
The Economic Loss Doctrine as a Barrier to Data Breach Recovery Audrey McNeil (May 22)
Company formerly known as Yahoo will pay $35 million to settle federal charges over 2014 hack Audrey McNeil (Apr 25)
Businesses are using injunctions to stop hackers publishing secrets Audrey McNeil (Apr 20)
Companies Must Invest in More Robust Insider Threat Programs Audrey McNeil (Jun 27)
Ten Best Practices for Outsmarting Ransomware Audrey McNeil (Jun 01)
Navigating the Five Frequent Hazards of IT Security Audrey McNeil (May 16)
Cyber-Safety First!: Protecting the Integrity of Your Brand Audrey McNeil (Jun 12)
SIEM vs Security Analytics: What’s the Difference? Audrey McNeil (Jun 22)
For a more secure world, cities must share information on cyber-attacks - experts Audrey McNeil (Apr 30)
SEC sounds cyber 'wake-up call' to public companies Audrey McNeil (May 07)
To defend cities from cyberattack, think like a hacker Audrey McNeil (Apr 12)
Does your cyber incident response plan include these best practices? Audrey McNeil (Jun 15)
How Saks and Lord & Taylor's CEO Dealt With a Massive Data Hack a Month Into Her Job Audrey McNeil (May 18)
What CISOs can learn from Tyrion on Game of Thrones Audrey McNeil (Jun 01)
How to Potentially Mitigate Post-Breach Cybersecurity Litigation Costs Audrey McNeil (May 21)
Exploring the Standing Challenge in Data Breach Litigation Audrey McNeil (Apr 04)
Europol dismantled the Rex Mundi hacker crew, it arrested another member of the gang Audrey McNeil (Jun 22)
Why Supply Chain Security Should be a Strong Link Audrey McNeil (May 29)
Ninth Circuit Finds Data Breach Customers Have Initial Standing to Sue Audrey McNeil (Apr 09)
Security Breached - Tips for Mitigating and Protecting Private Information from Inside and Outside Threats Audrey McNeil (Apr 02)
What is a breach of data protection? Audrey McNeil (May 30)
Straight Tricks To Better Safeguard Your Company’s Database Audrey McNeil (Jun 12)
How Free Public Internet is Turning Remote Employees Into Prime Targets for Hackers Audrey McNeil (May 16)
Preparing for a Potential Healthcare Data Breach Investigation Audrey McNeil (Apr 06)
Simple Steps To Strengthen Your Network Security Audrey McNeil (May 30)
How can accountants prepare to comply with GDPR? Audrey McNeil (May 16)
Hiring and Training Challenges for CISOs in 2018 Audrey McNeil (Apr 10)
The Hacked & the Hacker-for-Hire: Lessons from the Yahoo Data Breaches (So Far) Audrey McNeil (May 15)
Security basics for the small business owner to defeat cyber-terrorists Audrey McNeil (May 30)
Distributed Cybercrime is a Growing Threat to Critical Infrastructure Audrey McNeil (Apr 09)
Only 40 per cent of Canadian firms surveyed have data breach response procedures Audrey McNeil (Jun 04)
Two More Circuits Find Data Breach Standing without Proof that Plaintiffs’ Data Was Misused Audrey McNeil (Apr 25)
Why Multi-cloud Security Requires Rethinking Network Defense Audrey McNeil (Apr 09)
How To Change Security Behaviors: Social Media Audrey McNeil (Jun 25)
Did Opening That Email Place Your Business in Legal Hot Water? Audrey McNeil (May 21)
Don’t forget the basics in the battle against cybercrime Audrey McNeil (Jun 22)
Are Your Employees Putting Your Company at Risk? Here’s How to Find Out! Audrey McNeil (May 22)
Every Day is D-Day on the Data-Breach Beaches Audrey McNeil (Apr 03)
Things employees can do to help with security Audrey McNeil (Jun 29)
CEOs: Are You Prepared For The Real World Ramifications Of Cyber Attacks? Audrey McNeil (Jun 25)
Ransomware: It’s Not Just the Ransom, There are Hidden Expenses As Well… Audrey McNeil (Jun 06)
Why Your Staff Need To Think Like Hackers Audrey McNeil (May 18)
How cyber-security can embed a sustainable privacy operating model Audrey McNeil (May 10)
To Avoid Cyberattacks, You Must Clean Your Data. Here's Why. Audrey McNeil (Jun 01)
The Seven Phases of a Cyber Attack Audrey McNeil (May 15)
The value of 20/20 hindsight in cybersecurity Audrey McNeil (Apr 10)
“Safe from harm” - Data protection and network security made easy for businesses Audrey McNeil (May 16)
Managing Risk a Must in Third-Party Relationships Audrey McNeil (May 07)
Best practice CNI defence should emphasise resilience, not just compliance Audrey McNeil (Jun 12)
Breach activity declines, number of compromised records remains high Audrey McNeil (May 11)
Major Tech Companies Create Cybersecurity Charter of Trust Audrey McNeil (Apr 20)
Understanding the Latest Cybersecurity Threats Audrey McNeil (Jun 06)
Is your senior team covered for GDPR breaches? Audrey McNeil (Jun 20)
Why Your Thought About Ransomware Is Wrong Audrey McNeil (May 30)
Data Breach Notification Laws Now Enacted in All 50 States Audrey McNeil (Apr 11)
Now That GDPR Has Arrived, Here Are 5 Ways Your Company Can Catch Up Fast Audrey McNeil (Jun 05)
How Can You Tell If Your Enterprise Has Been Hacked? Audrey McNeil (Apr 25)
Hackers and scammers aren't just hitting big businesses, but small ones too Audrey McNeil (May 10)
How To Truly Keep Your Company's Data Safe From Hackers Audrey McNeil (May 02)
New Guidance Mandates Greater Attention to Cybersecurity Planning Audrey McNeil (Apr 19)
The Cost of Compliance – and Why Organizations Neglect It Audrey McNeil (Apr 12)
Federal Lawsuit Filed Following Alleged CVS Health Data Breach Audrey McNeil (Apr 04)
Sunshine, Disinfectant and SEC Guidance on Cybersecurity Disclosures Audrey McNeil (May 29)
Four surprising threats to your cyber security Audrey McNeil (Jun 20)
Stay Out of the Headlines: Maintain a Healthy Security Posture Audrey McNeil (Jun 05)
Can Cryptojacking Result in a Databreach? Audrey McNeil (May 30)
Should the FDA Create a Cybersecurity Measuring Stick? Audrey McNeil (Jun 18)
What Do Self-Driving Cars Have to Do with Machine Learning for Cybersecurity? Audrey McNeil (May 22)
Getting security ‘right’ Audrey McNeil (Jun 06)
Is User Training the Weakest Link for Your Email Security Approach? Audrey McNeil (Jun 29)
Staying Safe- Easy Ways to Create a Culture of Security in Organization Audrey McNeil (Jun 06)
Top Five Reasons Why HR Departments Need a Document Management System Audrey McNeil (May 01)
4 main reasons why SMEs and SMBs fail after a major cyberattack Audrey McNeil (Jun 18)
How to Secure Your Small Business in a Comprehensive Way Audrey McNeil (Jun 06)
Why Endpoint Security is So Important for Startups Audrey McNeil (Jun 20)
Endpoint Security Advice for the CISO on the Go! Audrey McNeil (Jun 15)
The Path To Better Management Of Healthcare Data Audrey McNeil (May 18)
Uninstall or Disable PGP Tools, Security Researchers Warn Audrey McNeil (May 15)
Alternative communications planning and cybersecurity incident response Audrey McNeil (Apr 11)
Deal with data risks in the boardroom or pay in the courtroom Audrey McNeil (May 23)
Op-Ed: Eight action steps to take when a hacker steals company data Audrey McNeil (May 14)
Is It Really My Responsibility to Look After My Employees Data? Audrey McNeil (Apr 27)
Australia needs to do more on data protection Audrey McNeil (May 07)
Life Under #GDPR and What It Means for Cybersecurity Audrey McNeil (Apr 27)
The Executive Guide to Demystify Cybersecurity Audrey McNeil (Jun 26)
3 Basic Practices for Cleaning Your Website Security Strategy Audrey McNeil (Jun 29)
Data privacy and cyber security: the importance of a proactive approach Audrey McNeil (Jun 20)
Hacker Defaces Ticketfly’s Website, Steals Customer Database Audrey McNeil (Jun 01)
3 Things You Need to Protect Your New Business Against Audrey McNeil (Jun 26)
Threat modeling: What’s all the buzz about? Audrey McNeil (Jun 26)
Reframing Cybersecurity As A Business Enabler Audrey McNeil (Apr 19)
Breaches Aren’t Inevitable: Employees and Cybersecurity Audrey McNeil (May 04)
What will it take for the C-suite to care about cyber-threats? Audrey McNeil (Jun 05)
Cybersecurity for the Fourth Industrial Revolution Audrey McNeil (Jun 22)
Destination data breach — the unexpected stop on the customer journey Audrey McNeil (Jun 26)
NHS given a lashing for lack of action plan one year since WannaCry Audrey McNeil (Apr 19)
GDPR: A Cost vs. Benefit Analysis Audrey McNeil (Apr 24)
Canada: Are You Ready for Mandatory Breach Reporting and Notification? Audrey McNeil (Apr 24)
Information security is not IT’s job Audrey McNeil (Jun 04)
Here's a transaction Transamerica regrets: Transgressors swipe retirees' personal info Audrey McNeil (Jun 06)
5 Enterprise Cybersecurity Threats and How to Minimize Them Audrey McNeil (Jun 12)
Addressing The Security Risk of Live Backups Audrey McNeil (May 07)
10 everyday workplace activities that will totally change under the GDPR Audrey McNeil (Apr 26)
SEC Cyber Unit Brings Groundbreaking Data Breach Case Audrey McNeil (Apr 30)
The Rise and Fall of Ransomware Audrey McNeil (Apr 25)
Protecting against ransomware using PCI DSS and other hardening standards Audrey McNeil (May 21)
FDA Proposes Action to Enhance Medical Device Cybersecurity Audrey McNeil (Apr 20)
When Does a HIPAA Breach Exist? Audrey McNeil (Apr 06)
BLU settles with FTC over failed implementation of security procedures Audrey McNeil (May 04)
What Hamilton can teach us about insider threats Audrey McNeil (Apr 02)
How to protect your organization from cyber intrusion? Audrey McNeil (Apr 26)
Security tactics that won't slow your business down Audrey McNeil (Jun 01)
Compliance With GDPR Is Not The Answer To Your Security Challenges Audrey McNeil (May 22)
Defending Hospitals against Life-Threatening Cyber Attacks Audrey McNeil (Apr 27)
Be prepared to handle a mobile security breach Audrey McNeil (Apr 18)
Cybersecurity: It’s More than Just Technology Audrey McNeil (May 15)
Framing Unfair And Deceptive Trade Practices Claims In Data-Breach Lawsuits Audrey McNeil (May 16)
Just How Easy Is it to Be Hacked? Audrey McNeil (May 02)
Top 4 GDPR Misconceptions Audrey McNeil (Apr 13)
Why are hospitals such a major target for hackers? Audrey McNeil (Apr 23)
Why Enterprises Can't Ignore Third-Party IoT-Related Risks Audrey McNeil (May 16)
How to Shed the Security Operations Doldrums Audrey McNeil (Jun 26)
Why we Need Better Cybersecurity Measures Audrey McNeil (May 14)
GDPR 101: Keeping Data Safe Throughout the 'Supply Chain' Audrey McNeil (May 23)
Data Breach Notifications and Why Honesty is the Best Policy Audrey McNeil (Apr 26)
10 Security Behaviors That Anger Us Audrey McNeil (May 21)
Ransomware Attacks for Local Governments and Public Agencies: A Primer Audrey McNeil (Apr 11)
Hong Kong - High-tech cyber attack exposes data of 380, 000 Audrey McNeil (Apr 19)
Information security can enable business as soon as we change the conversation Audrey McNeil (Apr 11)
Ten Best Practices for Outsmarting Ransomware Audrey McNeil (Jun 29)
Cyber security: no longer just 'an IT problem' Audrey McNeil (Jun 26)
You’ve Been Hacked! A Cybersecurity Disclosure Guide for In-House Legal Counsel Audrey McNeil (Apr 20)
The Difference Between Phishing & Spoofing Audrey McNeil (May 10)
T-Mobile Stores Part of Customers' Passwords In Plaintext, Says It Has 'Amazingly Good' Security Audrey McNeil (Apr 09)
Why data governance should be corporate policy Audrey McNeil (Apr 27)
Global Security in an Age of Rising Cyber Threats Audrey McNeil (May 01)
3 Essential Cybersecurity Tips for Business Audrey McNeil (May 08)
Practical steps every business can take to mitigate cybersecurity risks Audrey McNeil (May 10)
The Value and Limits of Cyber Insurance Audrey McNeil (Apr 25)
Top 10 Cybersecurity Best Practices for Healthcare CISOs Audrey McNeil (Jun 27)
Seven Ways to Protect Your Organization’s Privileged Accounts Audrey McNeil (Jun 27)
Protecting Medical Device Security in the Age of Ransomware Audrey McNeil (Jun 27)
The 10 steps to achieving a data privacy compliance framework Audrey McNeil (Apr 25)
Can we end the healthcare data breach pandemic? Audrey McNeil (Apr 06)
Here’s what to do when you get a complaint letter from the HHS Office for Civil Rights Audrey McNeil (Apr 19)
Paper healthcare records highly vulnerable, yet often overlooked Audrey McNeil (Apr 11)
The GDPR and the European double breach whammy Audrey McNeil (Apr 11)
Does your security solution protect against GDPR non-compliance? Audrey McNeil (Jun 06)
Cybersecurity: Best Practices Audrey McNeil (Jun 01)
A freelancer's guide to wireless security Audrey McNeil (Apr 26)
Healthcare Hazards Involving Medical Records During Bankruptcy Audrey McNeil (May 11)
It’s Time for Everyone to Step Up: Securing the Data is Everyone’s Issue Audrey McNeil (May 08)
SunTrust employee may have tried to steal data from 1.5 million customers Audrey McNeil (Apr 23)
Ten Tips On Cyber Liability Insurance Audrey McNeil (May 18)
Why you are probably thinking about ransomware the wrong way… Audrey McNeil (May 23)
The Future of Cybersecurity Audrey McNeil (May 18)
The digital age threat facing retailers and other high-risk data organizations Audrey McNeil (May 21)
5 Tips to Make your Online Business Secure from Hackers Audrey McNeil (Apr 24)
Canada: Cybersecurity Risks for Directors and Officers Audrey McNeil (Apr 24)
Why businesses must think like criminals to protect their data Audrey McNeil (Apr 09)
Best Buy says some customers could be affected by data breach of third-party vendor Audrey McNeil (Apr 06)
Identifying anomalies before a breach: A networking approach to security Audrey McNeil (May 08)
Cybersecurity pervasiveness subsumes all security concerns Audrey McNeil (May 10)
Building a positive security culture Audrey McNeil (Apr 10)
No more waiting: it’s time for a federal data breach law in the U.S. Audrey McNeil (Apr 13)
5 Common Pitfalls in IT Security & How to Overcome Them Audrey McNeil (May 11)
Compliance Complexity: The (Avoidable) Risks of Not Playing by the Rules Audrey McNeil (May 14)
Leveraging Accountability to Fix Cybersecurity Audrey McNeil (Apr 09)
4 Easy Ways To Ensure Security For Your Online Business Audrey McNeil (Apr 12)
How to stay safe when working remotely Audrey McNeil (Jun 22)
HIPAA Security Rule Requires Physical Security of Equipment Audrey McNeil (Jun 04)
Three Ways that Counsel Can Assist Defense Contractors Achieve Proactive Compliance with the Department of Defense’s Newly Effective Cybersecurity Requirements Audrey McNeil (Jun 27)
The 3 hidden costs of incident response Audrey McNeil (May 11)
Best Practices for Keeping Patient Data Confidential Audrey McNeil (May 01)
Organizations Should Fear These 4 Cybersecurity Risks Audrey McNeil (Jun 29)
Language Matters When It Comes to a Data Breach Audrey McNeil (Jun 20)
Cyber needs to be centre stage for every world leader, minister and business CEO Audrey McNeil (Apr 10)
The Top Four Endpoint Backup Solution Security Tips Audrey McNeil (Apr 18)
Data Breach Laws are Increasingly Common, do they make a Sufficient Difference? Audrey McNeil (Jun 12)
Cyber security agencies overhaul grading system for online attacks Audrey McNeil (Apr 13)
Breaches and the Boardroom: How Directors Can Avoid Liability for Data Breaches Audrey McNeil (Apr 10)
Protecting network availability for GDPR compliance Audrey McNeil (Jun 14)
6 Ways to Improve Your Incident Response Plan for GDPR Audrey McNeil (Apr 18)
Commbank admits data breach: 15 years of customer statements missing Audrey McNeil (May 04)
How to create a culture of cyber safety Audrey McNeil (May 01)
Understanding the impact of GDPR on the customer journey Audrey McNeil (Apr 23)
4 main reasons why SMEs and SMBs fail after a major cyberattack Audrey McNeil (Apr 03)
Effective Ways To Improve Company's Cybersecurity Practices Audrey McNeil (May 15)
The Hidden Risks of SSH Audrey McNeil (May 01)
How to prepare for and react to a security breach Audrey McNeil (Jun 05)
It’s third parties, cry if you want to... Audrey McNeil (May 08)
The ethical and legal dilemmas of threat researchers Audrey McNeil (May 23)
Has your security evolved to counter Ocean’s Eleven of threat scenarios? Audrey McNeil (Jun 27)
What You Must Learn From Facebook's Mistakes With User Data Audrey McNeil (Apr 30)
Top 6 steps for GDPR compliance Audrey McNeil (Apr 04)
New York State Attorney General Settles Data Breach With Health Plan In An Unprecedented Settlement With HIPAA Compliance Undertones Audrey McNeil (Apr 13)
Reducing Cybersecurity Vulnerabilities Part of FDA Action Plan Audrey McNeil (Apr 23)
Firewalls: What They Are & Why You Need Them Audrey McNeil (May 02)
The Real Threat of Vicarious Liability Audrey McNeil (Apr 24)
Response Options For Businesses With Sensitive Data Breaches Audrey McNeil (May 01)
Compliance is Not Synonymous With Security Audrey McNeil (May 29)
GDPR and Employers – Five Questions Answered Audrey McNeil (Jun 04)
Why Cybersecurity Should Be on Everyone’s Plate Audrey McNeil (Jun 25)
Fighting ransomware with network segmentation as a path to resiliency Audrey McNeil (May 29)
'Cyber is Uncharted Territory And It’s Going To Get Worse…’ Audrey McNeil (May 22)
The Time to Develop a Benefit Plan Cybersecurity Policy Is Now! Audrey McNeil (Jun 05)
Why organizations need to create a new role: the Behavioural Intelligence Officer Audrey McNeil (May 23)
Four in 10 UK firms suffer cyber attack in last year Audrey McNeil (Apr 27)
Health Data Breach Tally Spikes in Recent Weeks Audrey McNeil (Apr 18)
How 21st century security teams can stop phishing schemes from stealing enterprise data Audrey McNeil (Apr 19)
The Do’s and Don’ts of Data Center Security Audrey McNeil (Apr 12)
Genealogy site MyHeritage discovered passwords of 92 million accounts on a private server, but says the data was encrypted Audrey McNeil (Jun 06)
Can SMBs Benefit from Outsourcing Security? Audrey McNeil (May 07)
A HIPAA Security Rule Risk Assessment Checklist For 2018 Audrey McNeil (Jun 22)
Enabling a Secure Business Audrey McNeil (Jun 13)
The Cybersecurity Honeypot: What You Need to Know Audrey McNeil (Apr 20)
Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus Audrey McNeil (Apr 04)
Five Critical Questions You Need to Ask About Your Sensitive Data Audrey McNeil (Apr 03)
Data is fast becoming more valuable than gold Audrey McNeil (Apr 18)
Proactive cyber security: UK-US alert on mass targeting of network devices Audrey McNeil (May 07)
Unintended recipient: Why is email still such a risk to data? Audrey McNeil (Jun 13)
Data breaches: Why law firms are at risk Audrey McNeil (May 08)
Hacker attacks Copenhagen’s Bycyklen, deletes entire database Audrey McNeil (May 10)
Cyber Insurance – a way for risk mitigation Audrey McNeil (May 29)
Comcast Patches Router Bug That Leaked Some Wi-Fi Passwords Audrey McNeil (May 23)
What Are The Penalties For Violating The HIPAA Audrey McNeil (Jun 25)
10 Common GDPR Myths Busted Audrey McNeil (May 11)
Twitter urges all 336M users to reset passwords due to hashing bug Audrey McNeil (May 04)
Nine reasons healthcare is the biggest cyberattack target Audrey McNeil (May 30)

Destry Winant

ZeroFont phishing attack can bypass Office 365 protections Destry Winant (Jun 21)
Suspected Member of TheDarkOverlord Hacking Group Arrested in Serbia Destry Winant (May 17)
Atlanta’s COO Speaks Out About Ransomware Recovery Destry Winant (May 17)
A Facebook Engineer Stalked Female Users. A Dentist's Receptionist Stole Patients' Identities. Here's How to Prevent These Things From Happening at Your Company. Destry Winant (May 31)
Just under 1 million personal records of South Africans leaked online Destry Winant (May 24)
Don’t Gamble With The GDPR Destry Winant (May 09)
How to Make Your IT Infrastructure More Secure: 15 Steps to Do Destry Winant (Apr 05)
OCR To Share HIPAA Data Breach Settlements With Victims Destry Winant (May 17)
At least 90, 000 Canadian bank customers may have been affected by two data breach Destry Winant (May 31)
Damage Control: 11 Steps To Take If Your Company Has Been Breached Destry Winant (May 09)
Why the answer to IT security woes isn't just hiring more talent Destry Winant (May 17)
Where did the zombies come from in Lake Worth? Destry Winant (May 24)
How to Cure the Healthcare System's 'Cyberflu' Destry Winant (Apr 05)
Tesla sues ex-employee for hacking, theft, and leaking to the press Destry Winant (Jun 21)
3 MSP Best Practices for Protecting Users Destry Winant (Jun 14)
Are regulations keeping you from using good passwords? Destry Winant (May 31)
Man-in-the-Middle (MITM) Attacks: What They Are And How To Prevent Them? Destry Winant (Apr 05)
Cybercrime: Under-Reporting Gives Hackers A Green Light Destry Winant (Jun 14)
GDPR: Regulators see sharp rise in complaints Destry Winant (Jun 28)
Magento Hackers Using Simple Evasion Trick to Reinfect Sites With Malware Destry Winant (Jun 21)
6 Steps for Applying Data Science to Security Destry Winant (May 24)
Are you properly backing up your business data? Destry Winant (May 17)
Execs don’t believe their companies learn the right lessons in cybersecurity Destry Winant (Jun 21)
Properly Framing the Cost of a Data Breach Destry Winant (May 09)
IT’s adult day care dilemma Destry Winant (May 09)
Are You Prepared for a Malicious Insider Threat? Destry Winant (Jun 28)
Video website AcFun suffers massive privacy breach by hackers Destry Winant (Jun 14)
$1.4M stolen from CHET school savings account Destry Winant (Jun 28)
AWS S3 security falls short at high-profile companies Destry Winant (Apr 05)

Inga Goddijn

Bigger than Ransomware, CryptoJacking is the new money maker Inga Goddijn (May 15)
Click2Gov or Click2Breach? Inga Goddijn (Jun 15)
[Hiscox Breach] Announcement regarding US commercial insurance claims Inga Goddijn (Apr 16)
GOVERNMENT LOSES LEGAL CHALLENGE OVER EXTENT OF DATA BREACH INVOLVING 1, 600 IMMIGRANTS Inga Goddijn (Jun 19)
Malware hits HR software firm PageUp with possible data compromise Inga Goddijn (Jun 07)
1.9 million user accounts hacked at recruitment website 51Job Inga Goddijn (Jun 19)
Defending Data: New Colorado Law Creates Stricter Obligations for Handling Data Breaches, Disposal, and Security Inga Goddijn (Jun 08)
10 best practices for bolstering security and increasing ROI Inga Goddijn (Apr 16)
BANCO DE CHILE WIPER ATTACK JUST A COVER FOR $10M SWIFT HEIST Inga Goddijn (Jun 15)
Zip Slip Flaw Affects Thousands of Open-Source Projects Inga Goddijn (Jun 11)
Protecting Trade Secrets in Europe – An Update Inga Goddijn (Apr 17)
MyHeritage – Bad Security or Bad Luck? Inga Goddijn (Jun 11)
Wellington: Potential data breach may have exposed information Inga Goddijn (Jun 08)
Five network security deficiencies endangering your corporate data Inga Goddijn (Jun 11)
Panera’s Breach And The Knead For National Notification Inga Goddijn (Apr 17)
Dixons Carphone admits huge data breach Inga Goddijn (Jun 13)
All 50 States Now Have Laws Regarding Notifications of Data Breaches Inga Goddijn (Apr 17)
How to Prevent Cloud Cryptojacking Attacks On Your Company Inga Goddijn (Jun 18)
Sutter Health employees fired after inappropriately accessing medical records Inga Goddijn (Jun 19)
Saks, Lord & Taylor Hit With Data Breach Inga Goddijn (Apr 02)
Can VPNs Really Be Trusted? Inga Goddijn (Jun 07)
Welcome GDPR! Inga Goddijn (May 25)
Mise En Place Restaurant Services, Inc. Notifies Clients, Individuals Following Cyberattack Inga Goddijn (Apr 16)
Wellington, Fla., Breach Larger than Initially Thought Inga Goddijn (Jun 15)
Liberty : CEO labels hack criminal act Inga Goddijn (Jun 18)
Oregon Amends Data Breach Notification Law Inga Goddijn (Jun 11)
Cybersecurity 101 for Small Law Firm Lawyers Inga Goddijn (Jun 07)
A paradise for data privacy advocates - Bermuda’s privacy law now in full effect Inga Goddijn (Apr 16)
Retired Airline Manager Who Hacked Former Employer Caught Thanks to VPN Logs Inga Goddijn (Apr 17)
Panera Bread left millions of customer records exposed on the web Inga Goddijn (Apr 03)
French authorities dismantle Black Hand dark web market Inga Goddijn (Jun 19)
'Vigilance' hacker charged over Minnesota government attacks Inga Goddijn (Jun 07)
The five most common IT security missteps Inga Goddijn (Jun 18)
Snell & Wilmer Rolls Out Interactive Data Breach Map Inga Goddijn (Jun 11)
The Ransomware Sausage Factory – Do You Really Want To Know How They Got Your Data Back? Inga Goddijn (May 02)
Where There's a Will, There's a Way; Beyond Dark Web Marketplaces Inga Goddijn (Jun 08)
Protecting trade secrets: technology solutions you can use Inga Goddijn (Apr 17)
OCR Announces Intention to Move Forward With Development of Methodology to Distribute Enforcement Funds to Victims of HIPAA Violations Inga Goddijn (Jun 19)
Oxnard city officials investigate data breach Inga Goddijn (May 31)
The Great (belated) Mozilla Firefox CVE Dump Inga Goddijn (Jun 13)
Chili's restaurants were hit by a data breach, compromising customer credit card information Inga Goddijn (May 14)
Too Good To Be True? Breach Activity Declines in Q1 2018 To 2012 Level Inga Goddijn (May 08)
Email Breach at Oxygen Equipment Maker Affects 30, 000 Inga Goddijn (Apr 16)
Why creativity is key to security Inga Goddijn (Jun 11)
Sears Holding, Delta Air hit by customer data breach at tech firm Inga Goddijn (Apr 05)

Richard Forno

Exactis said to have exposed 340 million records, more than Equifax breach Richard Forno (Jun 28)
Equifax Says Over 56, 000 Drivers Licenses, Passports, and More Were Also Stolen Richard Forno (May 09)