Uber Data Breach: 57 Million People Affected Posted on 22 November 2017 by David Bisson in Enterprise Security Uber Data Breach Demonstrates Need for Better User of Authentication, Data Encryption, and Faster Disclosure Uber Technologies Inc. has fired its chief security officer (CSO)… Cyber Insurance: The Challenges Facing Actuaries in Measuring Cyber Risk Posted on 17 October 2017 by David Bisson in Enterprise Security Given the ongoing growth of data breaches around the world, many businesses have already invested in or are looking into cyber insurance. In 2014, the… Deloitte data breach demonstrates why MFA and user access controls… Posted on 06 October 2017 by Danna Bethlehem in Enterprise Security With all of the data breaches occurring, you would think that companies would be faster to implement multi-factor authentication and user access controls, but we… Data breach statistics 2017: First half results are in Posted on 21 September 2017 by Michelle Leech in So far this year, the level of social awareness around cybersecurity and data breaches has exploded causing more people sit up and take notice. Historically,… Following Instagram breach, users urged: Protect accounts with 2FA Posted on 07 September 2017 by Mor Ahuvia in Enterprise Security Following the Instagram breach, users are urged to protect accounts with 2FA. The security hole caught Kasperky Lab’s attention after celebrities’ personal details being offered… Game of Threats: It’s Time for a New Data Security… Posted on 01 August 2017 by Jason Hart in Enterprise Security Game of Threats identifies the new data security mindset shifting from breach prevention to breach acceptance and focus on securing the breach. Security controls need… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories cost of a data breachdata breachEnterpriseEnterprise SecurityFinancial ServicesGDPRGDPR Breach NotificationGovernmentidentity and data protectionIoTMobilemulti-factor authenticationPhysical and Logical Accesspkipublic key infrastructureSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 12/12/17 @ 18:12 Sébastien Violette Thanks Ntomboxolo. I'm sure you also have some anecdotes to mention. ;-)02/12/17 @ 05:12 Ntombo @Sebastian . Well put 20years evolution of sim!24/11/17 @ 00:11 Alan Mac The simple facts in life anything created by man women can be un-done by the same the problem with any ANSWER is did you ask the correct question because if the question is wrong then you have the wrong answer ! In cloud and information storage I always find that most people ask the wrong question in search of a correct answer!