Whether it’s online or brick-and-mortar, every new store or website represents a new potential entry point for threat actors. With access to more personally identifiable information (PII) of customers than…
Browsing CategoryPersonally Identifiable Information (PII)
Incident Response for Health Care IT: Differences and Drivers
Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy…
How to Prepare for and Respond to a Data Privacy Breach
Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different…
The Best Threat Hunters Are Human
“You won’t know you have a problem unless you go and look.” Neil Wyler, who is known as ‘Grifter’ in the hacker community, made that statement as a precursor to…
Hospital Ransomware Attacks Go Beyond Health Care Data
The health care industry has been on the front lines a lot lately. Along with helping control the effects of COVID-19, it has been a prime target for ransomware. In…
What Is the True Cost of a Health Care Data Breach?
The health care industry has remained the top data breach target for eleven years in a row. Highly sensitive and personally identifiable information (PII) held by health care systems is…
What’s Behind the Leaks of Customer Data From Retailer Databases?
Retail data breaches involving customer data happen often today. However, they tend to be smaller insize than health care, finance or government breaches. So, the general public notices them less.…
Private 5G Security: Consider Security Risks Before Investing
So, 5G is one of those once-in-a-generation types of leaps that will alter how we operate. However, 5G security comes with a lot of challenges. Private 5G networks require us…
Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage
Some online experiences are so bad that 25% of users abandon an application after first use and never return. To avoid this retention problem, you should offer better engagement to…
Learning the Building Blocks of Your CIAM Framework Part 1: Capture
Ever been on a website, ready to check out, only to encounter multiple fields to fill at once? Did the process frustrate you and make you close the page without…