July 2018 Archives by author
Starting: Mon Jul 2 18:05:01 EDT 2018
Ending: Tue Jul 31 21:50:06 EDT 2018
Messages: 110
- [BreachExchange] 1.4 million online fashion shoppers exposed after data breach at UK ecommerce provider
Inga Goddijn
- [BreachExchange] How rogue data puts organisations at risk of GDPR noncompliance
Inga Goddijn
- [BreachExchange] Idaho Prison Officials: Inmates Hacked System to Get Credits
Inga Goddijn
- [BreachExchange] California Consumer Privacy Act: What you need to know to be compliant
Inga Goddijn
- [BreachExchange] Fourth Circuit Weighs in on Standing in Data Breach Litigation
Audrey McNeil
- [BreachExchange] Insider Threat: Common Myths and Misconceptions
Audrey McNeil
- [BreachExchange] Prediction of (Cyber)warfare — Security Teams Under Attack!
Audrey McNeil
- [BreachExchange] HIPAA & Medical Data Security for Web Developers
Audrey McNeil
- [BreachExchange] Cyber Security Insurance: Nine Questions to Ask to Determine Your Exposure
Audrey McNeil
- [BreachExchange] Software Patching Integral to PHI Data Security, HIPAA Compliance
Audrey McNeil
- [BreachExchange] Is GDPR Good For SME Data?
Audrey McNeil
- [BreachExchange] How your business can ensure HIPAA-compliant backups
Audrey McNeil
- [BreachExchange] Should Your Customers Trust You with Their Data?
Audrey McNeil
- [BreachExchange] Six Ways To Ensure Your Data Stays Private
Audrey McNeil
- [BreachExchange] The data dichotomy: are transformation and data security incompatible?
Audrey McNeil
- [BreachExchange] Pulling Lessons From Bad Cybersecurity News
Audrey McNeil
- [BreachExchange] Does your organisation have cyber insurance?
Audrey McNeil
- [BreachExchange] The ostrich security strategy is now very risky
Audrey McNeil
- [BreachExchange] The physical key to cybersecurity
Audrey McNeil
- [BreachExchange] Motivations and malware: inside the mind of a hacker
Audrey McNeil
- [BreachExchange] Using the Blockchain to Secure Sensitive Information
Audrey McNeil
- [BreachExchange] Four tips for keeping security worries away this summer
Audrey McNeil
- [BreachExchange] Suffered a data breach? Here’s how you manage the fallout
Audrey McNeil
- [BreachExchange] The Plight of the Password
Audrey McNeil
- [BreachExchange] In Security, What We Don't See Can Hurt Us
Audrey McNeil
- [BreachExchange] Cyber crime poses a massive threat to businesses, thanks to remote workers using unsecured public wifi
Audrey McNeil
- [BreachExchange] Hacker vs. Cybercriminals: What’s the Difference and Why It Matters
Audrey McNeil
- [BreachExchange] The Biggest Risk to Your Business: Inadequate Cybersecurity
Audrey McNeil
- [BreachExchange] Email data leaks just got riskier
Audrey McNeil
- [BreachExchange] Are You Failing To Learn From Cyberattack News?
Audrey McNeil
- [BreachExchange] Know your smart devices, they can be cyber villains
Audrey McNeil
- [BreachExchange] How Will The GDPR Survive In The Jungle of Big Data?
Audrey McNeil
- [BreachExchange] Why Cybersecurity Is Critical to Healthcare Innovation
Audrey McNeil
- [BreachExchange] How to Solve the Developer vs. Cybersecurity Team Battle
Audrey McNeil
- [BreachExchange] How to Avoid Self-Inflicted Cybersecurity Wounds
Audrey McNeil
- [BreachExchange] How Worried Should a Small Business Be About Cybersecurity?
Audrey McNeil
- [BreachExchange] Small business IT support: Why you need it
Audrey McNeil
- [BreachExchange] SEC Cybersecurity Update May Lead to Increased Oversight
Audrey McNeil
- [BreachExchange] Stop training your employees to fall for phishing attacks
Audrey McNeil
- [BreachExchange] Innovation in healthcare: A hacker’s dream and CISO’s nightmare?
Audrey McNeil
- [BreachExchange] Cybersecurity: It's about time
Audrey McNeil
- [BreachExchange] These Are The Top 3 Habits For Companies Hoping To Escape A Hack
Audrey McNeil
- [BreachExchange] California May Lower the Standing Threshold in Data Breach Litigation
Audrey McNeil
- [BreachExchange] Innovation in healthcare: A hacker’s dream and CISO’s nightmare?
Audrey McNeil
- [BreachExchange] HIPAA Enforcement: Where’s the Action?
Audrey McNeil
- [BreachExchange] Four Ways to Improve IT Security on a Limited Budget
Audrey McNeil
- [BreachExchange] How to Protect Your Organization from Spear Phishing
Audrey McNeil
- [BreachExchange] GDPR – emerging risks for SMEs
Audrey McNeil
- [BreachExchange] Five Tips for Minimizing Data Loss Risk in a Hybrid IT Environment
Audrey McNeil
- [BreachExchange] The Types of Hackers & Why They Hack
Audrey McNeil
- [BreachExchange] Security Think Tank: A good password policy alone is not enough
Audrey McNeil
- [BreachExchange] Your 2018 guide to cyber insurance is here
Audrey McNeil
- [BreachExchange] Three Emerging Technologies to Accelerate Incident Readiness
Audrey McNeil
- [BreachExchange] What is phishing and how to protect against It? by Liam Johnson
Audrey McNeil
- [BreachExchange] IMB data breach prompts 'comprehensive response'
Audrey McNeil
- [BreachExchange] We’ve had a data breach… let’s not tell anyone
Audrey McNeil
- [BreachExchange] HIPAA Changes May Be on the Way
Audrey McNeil
- [BreachExchange] Less Than Half of Cyberattacks Detected via Antivirus: SANS
Audrey McNeil
- [BreachExchange] California and GDPR “light”: A Match Made in Plaintiffs’ Lawyers Heaven?
Audrey McNeil
- [BreachExchange] Cyber security and data privacy: what are you over-looking?
Audrey McNeil
- [BreachExchange] Millions of Telefonica customers’ data exposed after security breach
Audrey McNeil
- [BreachExchange] Cyber Smarts: How to Avoid a Data Breach Lawsuit
Audrey McNeil
- [BreachExchange] Why Every Business Should Have a Data Protection Officer
Audrey McNeil
- [BreachExchange] What New Entrepreneurs Should Be Doing to Prevent Cybercrime
Audrey McNeil
- [BreachExchange] Memory Protection beyond the Endpoint
Audrey McNeil
- [BreachExchange] How to Teach Your Employees About Cybersecurity
Audrey McNeil
- [BreachExchange] Fallout From HIV Data Breach Concerns Legal Experts
Audrey McNeil
- [BreachExchange] PayPal's pal Venmo spaffs your pals' payments – and yours
Audrey McNeil
- [BreachExchange] Brit watchdog fines child sex abuse inquiry £200k over mass email blunder
Audrey McNeil
- [BreachExchange] Addressing incident response with some common sense
Audrey McNeil
- [BreachExchange] Cybersecurity | A forward-thinking approach
Audrey McNeil
- [BreachExchange] Network visibility and assurance for GDPR compliance
Audrey McNeil
- [BreachExchange] Voters' data was left exposed online because of course it was
Audrey McNeil
- [BreachExchange] Cyber security is being tightened at Australian airports after an identity card data hack
Audrey McNeil
- [BreachExchange] The Fundamental Flaw in Security Awareness Programs
Audrey McNeil
- [BreachExchange] Hack like a CISO
Audrey McNeil
- [BreachExchange] Getting Started with Successful Security Breach Detection
Audrey McNeil
- [BreachExchange] A Short Guide to Cyber Security for Small Businesses
Audrey McNeil
- [BreachExchange] Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen
Audrey McNeil
- [BreachExchange] 6 ways you are sabotaging your cyber defences
Audrey McNeil
- [BreachExchange] Understanding Why Spear Phish Are Highly Effective
Audrey McNeil
- [BreachExchange] The cybersecurity incident response team: the new vital business team
Audrey McNeil
- [BreachExchange] The Path to Securing IoT Ecosystems Starts at the Network
Audrey McNeil
- [BreachExchange] Tips For Getting Your GDPR Compliant Solution Approved
Audrey McNeil
- [BreachExchange] Insecure server left carmakers' trade secrets wide open
Destry Winant
- [BreachExchange] Don't Confuse GDPR Compliance with Security
Destry Winant
- [BreachExchange] What Does “Reasonable” Data Security Mean, Exactly?
Destry Winant
- [BreachExchange] Singapore public healthcare sector limits internet use
Destry Winant
- [BreachExchange] A Hidden Bug In The System Puts 21, 000 U.K. Students At Risk
Destry Winant
- [BreachExchange] 8 types of malware and how to recognize them
Destry Winant
- [BreachExchange] SIX REASONS TO THINK TWICE ABOUT YOUR DATA LAKE STRATEGY
Destry Winant
- [BreachExchange] Employee Causes Five Years of Data Breach Litigation
Destry Winant
- [BreachExchange] The Foundation of Cyber-Attacks: Credential Harvesting
Destry Winant
- [BreachExchange] Best Ways To Protect Your Organization & Keeping Your Employees Well-Versed in Data Security
Destry Winant
- [BreachExchange] Emotet Malware Evolves Beyond Banking to Threat Delivery Service
Destry Winant
- [BreachExchange] Sias says 2013 data breach hit 70,000 members
Destry Winant
- [BreachExchange] Chili’s and Macy’s Teach Very Different Lessons about Breach Response
Destry Winant
- [BreachExchange] Shipping Giant Cosco Hit by Ransomware Attack
Destry Winant
- [BreachExchange] Could complacency be setting in when it comes to ransomware?
Destry Winant
- [BreachExchange] A year later, cities using Click2Gov are still getting hacked
Destry Winant
- [BreachExchange] Proposed Settlement in Lawsuit Tied to Insider Breach
Destry Winant
- [BreachExchange] Cybersecurity & Business: Not Just an IT Problem
Destry Winant
- [BreachExchange] How Are Apps Like Slack And Dropbox Vulnerable To Attack?
Destry Winant
- [BreachExchange] 10 Common File Transfer Risks and How to Avoid Them
Destry Winant
- [BreachExchange] Telstra customer stumbles across contact details of 66, 000 fellow customers
Destry Winant
- [BreachExchange] New Spectre Variant Hits the Network
Destry Winant
- [BreachExchange] Blue Springs Family Care hit by ransomware attack that potentially compromised data of over 44, 000 patients
Destry Winant
- [BreachExchange] Data Breach? Don’t Panic—Just Remember These 4 Tips
Destry Winant
- [BreachExchange] Every Week Is Shark Week in Cyberspace
Destry Winant
- [BreachExchange] How COSCO responded to a cyberattack on its systems
Destry Winant
Last message date:
Tue Jul 31 21:50:06 EDT 2018
Archived on: Wed Aug 1 09:41:59 EDT 2018
This archive was generated by
Pipermail 0.09 (Mailman edition).