Facebook says it will soon issue a patch for a bug in its WhatsApp messenger application that can circumvent a security feature launched just last month for Apple devices. The flaw could let someone with physical access to a device bypass Face ID and Touch ID.
A Congressional committee is demanding Facebook provide answers concerning a complaint filed with the FTC alleging misleading privacy practices involving personal health information. The complaint also alleged a data leak exposed the names of over 10,000 cancer patients participating in a Facebook group.
Fast-food giant Wendy's has reached a $50 million settlement agreement with financial institutions that sued after attackers planted RAM-scraping malware on point-of-sale systems in 1,025 of its restaurants in 2015 and 2016, exfiltrating data for 18 million payment cards.
Among the hundreds of responses to a federal request for comments about potential changes to the HIPAA rules were suggestions for "safe harbors" that would shelter organizations with strong security strategies from HIPAA enforcement actions after a health data breach.
Achieving compliance is the start of your data security journey. Don't let it stop you before you get started
View this infographic to discover how IBM can protect your business from:
Theft of trade secrets and product designs
Exposed sensitive data in cloud and big-data environments
Undetected insider...
These days, data security breaches are more common than ever and more expensive. Global studies show that the average total cost of a data breach is now USD3.8 million. What's more, the loss of trade secrets, product designs or other intellectual property can spell financial ruin for an organization. Because of its...
In April 2018, IBM commissioned Forrester Research consulting to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) that organizations may realize by deploying IBM Security Guardium. The study uncovered that organizations achieve cost and risk reductions while increasing...
Organizations are rapidly moving to the cloud, leveraging infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS) as new ways to optimize their business, even though these environments present new risks to sensitive data. Data security and protection technologies should be...
Guardium helps organisations efficiently identify the risk associated with personal and sensitive personal data that falls under the General Data Protection Regulation (GDPR). The service applies next generation data classification, as well as vulnerability scanning, to uncover risks associated with such data in cloud...
Virtualization is the creation of a logical rather than an actual physical version of something, such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance...
A security consultancy discovered Facebook user data exposed in two different places online without authentication or encryption. The data, which is now offline, came from an Android app that purported to offer statistical information to logged-in users.
The IBM Resilient Incident Response Platform (IRP) is a leading platform for orchestrating and automating incident response processes.
Security organizations can significantly drive down their mean time to find, respond to, and remediate using the platform. It quickly and
easily integrates with your organization's...
Many organizations are seeking to lessen the impact of the cybersecurity skills gap by increasing the productivity of their existing staff. And they are realizing that incident response (IR) can help.
IR orchestration provides a guided response, which ensures analysts know what they need to do and when they need to...
Intelligent Orchestration - the next generation of incident response (IR) - is a powerful security capability that uniquely blends human and machine intelligence with orchestration and automation, dramatically accelerating and sharpening organizations' response to cyberattacks.
Download IBM Resilient's latest...
Cybercriminals continue to evolve and come up with increasingly complex attacks. SOCs can barely keep ahead of the deluge of alerts they face or the ever-changing regulatory landscape. Analysts and managers spend time preparing executive reports instead of protecting against and addressing threats.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.