ISACA And SecurityScorecard Define Critical Questions To Implement Continuous Assurance For Data

Data... The New Asset Class

ISACA and SecurityScorecard announce a joint research paper, “Continuous Assurance Using Data Threat Modeling,” to provide enterprises guidance in adopting an attacker’s point of view to help account for data. With a step-by-step guide to apply application threat modeling principles to data, enterprises can now establish a baseline for monitoring ongoing data risk over time. Enterprises are […]

Another Local Government Agency Hacked

The latest local government data breach has occurred in Midland, Texas where hackers leveraged a vulnerability in Superion’s Click2Gov function in the payment server used to make online payments for utilities. Other cities might be affected as well including Beaumont, California, Oceanside California and Goodyear, Arizona. Ryan Wilk, VP of Customer Success: “Hackers will leverage […]

How Does IoT Expand Hackers’ Attack Surface?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No, this is not a vision statement, but a reflection of our reality.  From wearables to smart home systems and routers… Devices with sensors that collect data in real time are rapidly expanding. To many they are […]

Popular US Fast food Chain Hit By Data Breach

A popular chicken restaurant chain with several locations in central North Carolina said a “cyber-attack” by a “hacker” over an 11-month period took customer names and credit card info. PDQ restaurants, which primarily sell chicken, were hit by the “breach” between May 19, 2017, and April 20, 2018, according to a news release from the restaurant […]

World Cup Wall Chart Phishing Scam

Check Point has identified a phishing campaign linked to the start of the FIFA World Cup where cyber-criminals attempt to lure would-be victims into downloading a schedule of fixtures and a result tracker. When opened, the attachment uses a malware variant called ‘DownloaderGuide,’ a known downloader of potentially unwanted programs (PUPs) that is most commonly used as […]