Data Loss

Show
Enabling Soi Dog’s Digital Transformation: A Case Study
May 8, 2019

At the beginning of this year I was introduced to Spencer Hardy, the IT manager for an animal charity called …

read more

Third Party Risk: 4 ways to manage your security ecosystem

January 16, 2020

  The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can …

read more

2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

December 18, 2019

  If all the holiday fuss isn’t reminder enough, 2020 is almost upon us. 2019 was an unusual year in …

read more

2.3 billion files exposed across online file storage technologies

December 3, 2019

Originally published May 2019 2.3 billion is a massive number. It’s hard even to wrap your head around; what do …

read more

Understanding the Consequences of Data Leakage through History

October 24, 2019

One of the most interesting aspects of transitioning from high school history teacher to cyber threat intelligence professional is the …

read more

Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

October 17, 2019

Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of …

read more

ANU Breach Report: Mapping to Mitre ATT&CK Framework

October 11, 2019

Introduction This week, the Australian National University (ANU) published a report on an intrusion into their networks that occurred in …

read more

SecDevOps: Continued Database Exposures Point to Growing Challenges

September 24, 2019

Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is …

read more

Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

September 17, 2019

Data breaches are not slowing down. Nobody expects to be a victim, but the data shows the exponential growth in …

read more

Breach! An Analysis of the Modern Digital Breach, with Cyber Defense Lab’s CEO, Bob Anderson

August 22, 2019

Just prior to the BlackHat & DEFCON, my colleague Rick Holland and I were fortunate to share some time in …

read more

Capital One Breach: What we know and what you can do

July 31, 2019

Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling …

read more

Harnessing Exposed Data to Enhance Cyber Intelligence

July 11, 2019

Register for our upcoming webinar “Harnessing Exposed Data to Enhance Cyber Intelligence” with Harrison Van Riper and Michael Marriott to …

read more

Leaky SMB File Shares – So Many Bytes!

June 19, 2019

Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting …

read more

Managing Digital Risk: 4 Steps to Take

June 18, 2019

Organizations are finding it increasingly difficult to know where their data is stored and shared in today’s technology-forward, connected world. …

read more

Detecting Exposed Company Data: The What, Why, and How

March 12, 2019

What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

SingHealth Breach Post-mortem: Key Findings

January 29, 2019

On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare …

read more

81,000 Hacked Facebook Accounts for Sale: 5 Things to Know

November 2, 2018

This morning, the British Broadcasting Corporation (BBC) published an article detailing how online actors had obtained and advertised at least …

read more

Cyber Security Awareness Month: Week 1 – Credential Hygiene

October 3, 2018

It’s the opening week of the annual National Cyber Security Awareness Month (U.S.) and Cyber Security Month (Europe). While good …

read more

GAO’s Equifax Post-mortem Report

September 11, 2018

It’s common for the exciting and novel issues that confront security professionals on a daily basis to be hyped up. …

read more

Digital Shadows Contributes to Insider Threat Research

August 9, 2018

On July 30, Forrester published its latest research report on malicious insiders, Defend Your Data As Insiders Monetize Their Access. …

read more

Keys to the Kingdom: Exposed Security Assessments

April 24, 2018

Organizations employ external consultants and suppliers to perform assessments and penetration tests that help to bolster their overall internal security. …

read more

Out In The Open: Corporate Secrets Exposed Through Misconfigured Services

April 18, 2018

For organizations dealing with proprietary information or assets, one of the greatest concerns is the threat of competitors getting hold …

read more

When There’s No Need to Hack: Exposed Personal Information

April 17, 2018

With Equifax‘s breach of 145 million records still fresh in everyone’s memory and the recent Facebook data privacy controversy, protecting personal …

read more

Leveraging the 2018 Verizon Data Breach Investigations Report

April 10, 2018

Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 …

read more

When Sharing Is Not Caring: Over 1.5 Billion Files Exposed Through Misconfigured Services

April 5, 2018

Our recent report “Too Much Information”, discovered over 1.5 billion files from a host of services, including Amazon S3 buckets, …

read more