by Chris Dorr | Apr 1, 2019 | Third Party Risk Management
Reading Time: 3 minutes
Editor’s Note: This post was originally published in May 2017. It has been updated to reflect the name change from AUP to SCA. As hacker monikers go, TheDarkOverlord (TDO) picked a pretty catchy one. Not much is known about this...
by Bob Cohen | Mar 28, 2019 | Business Continuity Management
Reading Time: 3 minutes
One of the top benefits of a Business Continuity Plan is that it helps the business react more quickly and effectively to disruptive events like cyber breaches. In the face of new and emerging legislation like GDPR and CCPA that...
by Michael Gargiullo | Mar 19, 2019 | InfoSec Strategies
Reading Time: 2 minutes
Even this era of near-daily data breach headlines, the Collection 1 trove gives one pause. What is being called the largest public breach ever is apparently just the tip of a gargantuan, 4TB iceberg of unique emails and passwords,...
by Michael Gargiullo | Jan 22, 2019 | ISMS Consulting
Reading Time: < 1 minuteThe largest public data breach ever just hit the web, with almost 800 million emails and over 21 million passwords “dehashed” and exposed as plain text. Dubbed Collection #1, this apparent amalgamation of over 2,000 breached data stores...
by Terry Crowley | Jun 14, 2018 | InfoSec Strategies
Reading Time: 2 minutes
Speaking at the recent CyberUK conference in Manchester, Dave Hogue, senior technical director of the Cybersecurity Threat Operations Center at the NSA, flatly stated: We have sophisticated adversaries using unsophisticated means to...