breaches   204

« earlier    

How Not to Acknowledge a Data Breach
"Overall, I’m willing to chalk this entire episode up to a complete lack of training in how to deal with the news media, but if I were a customer of Wipro I’d be more than a little concerned about the tone-deaf nature of the company’s response thus far.

As one follower on Twitter remarked, “openness and transparency speaks of integrity and a willingness to learn from mistakes. Doing the exact opposite smacks of something else entirely.”
a  little  sunshine  data  breaches  bhanu  ballapuram  wipro  breach 
17 hours ago by jonerp
Breach Clarity | Data Breach Analysis
Interesting (beta) tool to answer the question "how bad is it that I was in X breach and what should I do about it?"
510  breaches  tools  usability 
25 days ago by dsalo
A Deep Dive on the Recent Widespread DNS Hijacking Attacks
"The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy.

This post seeks to document the extent of those attacks, and traces the origins of this overwhelmingly successful cyber espionage campaign back to a cascading series of breaches at key Internet infrastructure providers."
a  little  sunshine  data  breaches  the  coming  storm  apnic  bill  woodcock  cisco  talos  comodo  crowdstrike  dhs  dnspionage  dnssec  epp 
8 weeks ago by jonerp

« earlier    

related tags

&  12  2018  351  424%  449  510  59k  644  768  90  91  @troyhunt  @twitter  a  access  alert  algorithms  all  amends  american  angellist  api  apnic  apollo  apple  archives  arnie  attacksteps  attribution  authnz  authorization  ballapuram  barometer  berkeley's  bhanu  bigdata  bill  biometrics  bit  blogs  breach  bug-bounties  bug  bugreporting  business  byod  centrify  ceos  checkup  chosen  cisco  cloud  cloudstorage  collected  columbus  coming  comodo  complyright  computer  concepts  confirmed  consumers  corruption  credentials  credit  creditkarma.com  crowdstrike  cryptography  cybersecurity  data  databreaches  dataliteracy  dataset  delivery  dhs  disclose  disclosure  discovery  dnspionage  dnssec  draft  edtech  efile4biz.com  elsevier  email  enactment  entertainment  epp  equifax  equifearian  ethics  exactis  excel  experian  extension  face  facebook  fail  failing  failure  featured  fines  firefox  fixes  for  fraud  freeze  from  gdpr  general  gmf  google  government  govt  guides  hackbacks  hacking  hacks  hansen  has  havibeenpwnd  healthcare  highered  hipaa  horrorstories  hotels  howto  idaptive  identifiers  imposed  in  incidentresponse  increase  india  infoec  informed  infosec  infsosec  insiderthreat  inspector  institute  international  ip  is  jail  k12  kickass  launches  law  leaks  learninganalytics  libraries  linkedin  little  lock  louis  mariott  massachusetts  medicine  midterm  million  minimisation  ne'er-do-well  new  news  nicholas  no  not  now  of  office  officials  old  on  opsec  orgbehavior  over  part1  part2  part3  part4  part5  password  passwords  penalties  pin  policy  posts  premier  previous  privacy  privilege  privileged  protecting  protenus  pwned  ransomware  recordsmgmt  refund  reidentification  reported  robert  russia  science  search  secret  security.is.hard  security  see  service  shows  sign  since  sites  socialmedia  software  storm  sunshine  surveillance  talos  tax  tech  technology  the  theft  time  to  tools  transunion  trends  trust  trustedid  tutorial  tweets  u.s.  uc  under  unsurprising  usability  users  usps  vectors  view-as  visibility  votes  vulnerabilities  vulns  warnings  weaver  whitepaper  wipro  with  woodcock  would  year  zero  zuck 

Copy this bookmark:



description:


tags: