#third-party-risk

[ follow ]
#data-breach
Information security
fromIT Pro
2 days ago

Cybersecurity leaders must stop seeing resilience as a "tick box exercise" to achieve meaningful protection, says Gartner expert

Businesses need business-function level BIAs, cross-team collaboration, and full asset and third-party visibility to embed effective cyber resilience.
fromComputerWeekly.com
3 days ago

Harrods hackers start contacting customers | Computer Weekly

"We are aware that some e-commerce customers have been directly contacted by someone purporting to have taken some personal data from one of our third-party providers' systems," a Harrods spokesperson told Computer Weekly. "We have notified all relevant authorities, including the National Cyber Security Centre and the Metropolitan Police Cyber Crime unit, and they are actively investigating. "Negotiating with cyber criminals does not result in any guarantees as to what they may do with the information they have accessed," the spokesperson said.
Information security
fromBusiness Matters
5 days ago

How Copla Helps UK Firms Navigate DORA Directive Compliance

Cloud platforms, outsourced IT, and digital trading systems power day-to-day operations - but they also introduce serious risks. Cyberattacks, system failures, and supplier disruptions can trigger regulatory breaches, financial losses, and reputational damage. To strengthen the resilience of Europe's financial system, the EU introduced the Digital Operational Resilience Act (DORA), often called the DORA Directive. Although the UK is no longer part of the EU, DORA still applies to many UK firms.
Miscellaneous
#cyberattack
Information security
fromEntrepreneur
2 weeks ago

The Shocking Cost of Vendor Data Breaches | Entrepreneur

Digital supply-chain interdependencies create cascading vendor-related outages and breaches that require companies to manage supplier and third-party data risks proactively.
#data-breaches
fromIT Pro
4 weeks ago
Privacy technologies

Lack of visibility creates "cascade" of security risk, says Kiteworks

fromIT Pro
4 weeks ago
Privacy technologies

Lack of visibility creates "cascade" of security risk, says Kiteworks

fromSecuritymagazine
1 month ago

Security Leaders Respond to Workday Cyber Incident

More than 19,300 individuals are employed at Workplace across North America, EMEA and APJ. The client list contains more than 11,000 companies across a range of sectors, including almost two-thirds of the Fortune 500 companies. According to the organization's on the incident, Workday was targeted by a social engineering campaign. The post stated, "In this campaign, threat actors contact employees by text or phone pretending to be from human resources or IT. Their goal is to trick employees into giving up account access or their personal information."
Information security
#cybersecurity
fromSecuritymagazine
2 months ago
Privacy professionals

Security Leaders Discuss Qantas Breach

Qantas experienced a significant cyberattack impacting customer data, with expectations of extensive information theft.
fromSecuritymagazine
4 months ago
Information security

Securing Healthcare: Safeguarding Patient Care and Privacy Through Agile Cyber Strategies

Healthcare organizations are increasingly targeted by cyber attackers due to sensitive data and high operational costs of breaches.
Ransomware attacks have surged, with healthcare suffering a 128% increase in 2023.
Information security
fromSecuritymagazine
4 months ago

Securing Healthcare: Safeguarding Patient Care and Privacy Through Agile Cyber Strategies

Healthcare organizations are increasingly targeted by cyber attackers due to sensitive data and high operational costs of breaches.
Ransomware attacks have surged, with healthcare suffering a 128% increase in 2023.
fromSecuritymagazine
3 months ago

Product Spotlight on Risk Monitoring

CyberStrong is designed for enterprise-level cyber risk management, enabling quick identification and quantification of cyber risks while prioritizing controls using financial metrics.
Information security
Information security
fromSecuritymagazine
4 months ago

More than 40% of Fintech Breaches Linked to Third-Party Vendors

Fintech companies show strong cybersecurity scores but face significant vulnerabilities from third-party risk.
Application security weaknesses are prevalent in the fintech sector, exposing firms to breaches.
fromCSO Online
4 months ago

If you use OneDrive to upload files to ChatGPT or Zoom, don't

Sensitive secrets required for this access are often stored in an insecure manner by default," Schwake said. "This situation presents a key API security challenge for security teams, and with services like ChatGPT heavily depending on APIs to access and handle user data, this poses an even greater risk.
Privacy technologies
[ Load more ]