Reports have suggested that the Zendesk vulnerability could have given hackers access to customer data. Full story: Zendesk Vulnerability Could Have Given Hackers Access to Customer Data | SecurityWeek.Com
Reports have suggested that the Zendesk vulnerability could have given hackers access to customer data. Full story: Zendesk Vulnerability Could Have Given Hackers Access to Customer Data | SecurityWeek.Com
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Experts Insight On US Pipeline Shut After Cyberattack
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
Situations like this one should make any conscientious enterprise stop, investigate, and determine whether its most sensitive data is really protected enough to prevent exposures like this. Vulnerabilities are always hiding somewhere in the software, just waiting to be discovered and exploited, so your defensive posture should focus on protecting the data itself. Data-centric security such as tokenization and format-preserving encryption can replace sensitive data elements with benign representational tokens, so even if perimeter breaches or vulnerabilities lead to the wrong people getting hands on your enterprise data, sensitive information still remains fully protected and cannot be leveraged for financial gain by threat actors.