France has hit Google with a 50 million euro ($57 million) fine for violating the EU's General Data Protection Regulation. The country's data regulator says Google doesn't inform users in a clear way how their data is being collected and processed for targeted advertising.
GDPR has been in effect since May 2018, but organizations are still waiting to see what impact it will have on the costs organizations might face from breach cleanup, investigations, sanctions and class action lawsuits, says Ian Thornton-Trump of the financial services firm AMTrust International.
Implementation of software-defined wide area network (SD-WAN) solutions can be a complex process, with multiple factors affecting the overall performance of the device.
NSS research indicates that SD-WANs are typically deployed with the vendor's pre-defined or recommended (i.e., "out-of-the-box") settings. The tested...
Most organizations are undergoing some form of digital transformation (DX). But DX initiatives bring complexity for network operations teams. With business-critical services distributed across multiple clouds, this leads to potential performance issues.
Given these realities, it is no wonder that SD-WAN technology is...
Leading the latest edition of the ISMG Security Report is an in-depth look at why ransomware remains a pervasive threat and how it's evolving. Also featured: updates on venture capital investments in cybersecurity and a study of vulnerabilities in industrial remotes.
Airline booking system provider Amadeus - whose system is used by 500 airlines - is investigating a software vulnerability that exposed passenger name records, which is the bundle of personal and travel data that gets collected when booking a flight.
Australian security expert Troy Hunt says an 87 GB compilation of username and password combinations - drawn from more than 2,000 databases - includes 773 million unique email addresses for apparent use in credential-stuffing attacks. Takeaway: Use a unique password for every site, or else.
As you take advantage of the operational and economic benefits of virtualization and
the cloud, it's critical to secure your virtualized data centers, cloud deployments, hybrid
environments, and containers effectively. If you neglect any aspect of security, you leave
gaps that open the door to threats and serious...
Traditional security for development teams has been functionally separated, with different tools for different departments operated by different resources. However, this monolithic approach is changing rapidly as organizations look to transition development operations to cloud and container platforms.
This has led...
Most companies have huge gaps in their cyber security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: "Assume Breach".
Join Roger A. Grimes, a 30-year computer security consultant, for this webinar where he explores the latest research on what's wrong with current...
Enterprise use of artificial intelligence, including machine learning, is
taking off. Early adopters report widespread substantial benefits and
a few challenges.
Download this infographic to learn more about the top and bottom-line benefits from AI and ML.
The organization that manages IT for Singapore's public healthcare sector says it has terminated, demoted or financially penalized several employees for their roles in the handling of a 2017 cyberattack on SingHealth, the nation's largest healthcare group. What do U.S. security experts think of these measures?
The U.S. government shutdown is impacting agencies integral to the nation's cybersecurity readiness, and experts fear its long-term impact on the country's cyberattack response capabilities, as well as the risk that it will drive away desperately needed new cybersecurity talent from entering public service.
In a case of business email compromise, Chinese hackers stole $18.6 million from the Indian arm of Tecnimont SpA, an Italian engineering company, through an elaborate cyber fraud scheme that included impersonating the firm's chief executive.
A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident.