Reports have suggested that the Zendesk vulnerability could have given hackers access to customer data. Full story: Zendesk Vulnerability Could Have Given Hackers Access to Customer Data | SecurityWeek.Com

Reports have suggested that the Zendesk vulnerability could have given hackers access to customer data. Full story: Zendesk Vulnerability Could Have Given Hackers Access to Customer Data | SecurityWeek.Com
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
Situations like this one should make any conscientious enterprise stop, investigate, and determine whether its most sensitive data is really protected enough to prevent exposures like this. Vulnerabilities are always hiding somewhere in the software, just waiting to be discovered and exploited, so your defensive posture should focus on protecting the data itself. Data-centric security such as tokenization and format-preserving encryption can replace sensitive data elements with benign representational tokens, so even if perimeter breaches or vulnerabilities lead to the wrong people getting hands on your enterprise data, sensitive information still remains fully protected and cannot be leveraged for financial gain by threat actors.