(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

We were happy to participate in a community round table organized by CISO Platform Key Discussion Points :  What is Shadow IT? What are the types of Shadow IT? Practical demo using open source tools Controls to manage shadow IT risk Reason Of Risk :  No standardization Unknown risks Security breaches Data leaks Types OfRead more about (Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web[…]

Download Report – (Short Guide) On Attack Surface Analysis

Download Report – (Short Guide) On Attack Surface Analysis

Discover Your Attack Surface Before Hackers Do Not having real time view of your dynamic attack surface and the risks it is introducing, leaves an organization in the dark and serves as a low hanging fruit for attackers to use this exposed information to fuel their malicious attacks. Report Includes :  Why Your Expanding AttackRead more about Download Report – (Short Guide) On Attack Surface Analysis[…]

Download Report – 9 Critical Capabilities For Digital Risk Protection Program

Download Report – 9 Critical Capabilities For Digital Risk Protection Program

[Report] 9 Critical Capabilities Needed For Digital Risk Protection Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-newRead more about Download Report – 9 Critical Capabilities For Digital Risk Protection Program[…]

Doordash Breach (4.9 Million Customers Affected)

Doordash Breach (4.9 Million Customers Affected)

End of september, Doordash confirmed a data breach which affected 4.9 million customers, workers, merchants. Doordash is a popular food delivery company and their data was stolen by a group of hackers. They also informed, customers who affected after 5 April 2018 were not affected. The breach from data is known to have happened inRead more about Doordash Breach (4.9 Million Customers Affected)[…]

Yves Rocher Breach (2.5 Million Canadian Customers Affected)

Yves Rocher Breach (2.5 Million Canadian Customers Affected)

In early september, Yves Rocher warned about a data leak of millions of its customers. An exposed database left by a third party vendor was the cause of the breach. A server owned by Aliznet (serves IBM, Salesforce, Sephora, Louboutin) had an exposed database of Yves Rocher with millions of customer and their PII exposed.Read more about Yves Rocher Breach (2.5 Million Canadian Customers Affected)[…]

Click2Gov Breach (8 American Cities Affected)

Click2Gov Breach (8 American Cities Affected)

8 American Cities were affected by this breach. Click2Gov is a popular software solution used by local governments for receiving parking tickets or taxes. The software was developed by Superion. It’s a popular municipality payment software. Gemini said it had found at least 46 compromised U.S. locations and one in Canada, some of those compromisesRead more about Click2Gov Breach (8 American Cities Affected)[…]

American Medical Collection Agency (AMCA) Data Breach : Why It Happened & What Can You Learn? (24 Million Customers Affected)

American Medical Collection Agency (AMCA) Data Breach : Why It Happened & What Can You Learn? (24 Million Customers Affected)

24 million customers is approximated to be affected through this third party breach.  The data breach experienced by American Medical Collection Agency (AMCA), a third-party bill-collection vendor for the health institutions, affected 17 health institutions including the United States’ biggest lab testing companies, Quest and LabCorps. The affected institutes include Quest Diagnostics (12 Million),Laboratory Corporation OfRead more about American Medical Collection Agency (AMCA) Data Breach : Why It Happened & What Can You Learn? (24 Million Customers Affected)[…]

Cable One Data Breach : Why It Happened & What Can You Learn?

Cable One Data Breach : Why It Happened & What Can You Learn?

Cable One Inc. on 16 August 2019, said that a data breach earlier this year could have affected the personal information of some current and former employees, but also could have reached some of those employees’ family members. Although Cable One (NYSE: CABO) said it is not aware of any misuse of information as aRead more about Cable One Data Breach : Why It Happened & What Can You Learn?[…]

Steps To Build An Enterprise Third-Party Risk Management Program

Steps To Build An Enterprise Third-Party Risk Management Program

Vendor or enterprise third party risk related breaches are at an all time high. Several of the high profile breaches like Uber, Amazon, British Airways & more has been caused due to 3rd party. Most of the major security related framework, guidelines, compliance and regulations has made 3rd party risk management a mandatory part of overall security program. Following are the key steps for building an effective third party risk management (vendor risk management) program.

Capital One Hacked : Why It Happened & What Can You Learn?

Capital One Hacked : Why It Happened & What Can You Learn?

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers … The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened. TheRead more about Capital One Hacked : Why It Happened & What Can You Learn?[…]