Operations | Monitoring | ITSM | DevOps | Cloud

Data Breaches

Fantastic Data Breaches and How to Prevent Them Event

Named in the top 10 world’s most dangerous people alongside Trump & Putin, we are all under attack from Magecart. They attack websites, digital platforms & e-commerce 3rd party supply chains to steal our data, selling it to the highest bidder on the dark web. Our aim is to increase awareness on Magecart attacks, therefore we’ve created an event for Leeds Digital Festival.

Top 5 Open-Source HIDS Systems

The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot.

5 Reasons Why a Secure Server is Necessary for your Website

By 2020, the cost of a data breach would amount to a whopping $150 million! No industry is safe from such violations. Did you know that after every 39 seconds, there is a hacker attack on computers and websites? Think about how many cyber-attacks might happen as you are reading this. Your business and website can be one of them unless you take the necessary measures to secure your platform.

7 Signs of an Attempted Data Breach- and How to Stop It in Its Tracks

Data breaches come in all shapes, sizes, and levels of exposure. They can range from a couple of log files unintentionally left available to the public to the leak of hundreds of thousands of users’ personally identifiable information (PII). Don’t think that just because you have a secure network, a leak can’t happen to you.

Latest Marriott Breach Puts Focus on GDPR

A massive data breach at Marriott and Starwood Hotels and Resorts has put the General Data Protection Regulation (GDPR) back in the spotlight. As the hotel chain faces record fines under the GDPR, privacy experts are again extolling the importance of secure log management practices to avoid suffering a similar fate as Starwood.

Detecting Data Breaches by Example - Vision Direct

Just as we were getting ready to launch our Data Breach Monitor, we heard the unfortunate news that fellow Yorkshire based business Vision Direct had suffered a malware attack, which resulted in the loss of financial data of around 6,600 customers. So we asked ourselves, could we have detected the same attack using our new monitor? The only way to find out was to infect a website and see what would happen…

Conquer it with correlation-Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In this blog, we examine this larger problem and the role of event correlation in securing sensitive data.

Fantastic Data Breaches (and how to defend against them)

The retail world is under attack. Hackers across the globe are stealing personal details – including credit card information – on an alarmingly regular basis. This is done by placing digital “credit card skimmers” on compromised e-commerce sites. Hackers are able to access these sites usually through 3rd parties software in the form of JavaScript. Major retailers are prime targets – they are not immune and it’s a becoming a BIG problem for everyone.