Macy’s is a popular shopping destination and a breach before christmas shopping is a scare. On October 15 it notified customers of a magecart card-skimming device. The unauthorized code on payment page (checkout & wallet) could have accessed name, address, city, phone, email, payment card… Read More »Macy’s Breach November 2019
We were happy to participate in a community round table organized by CISO Platform Key Discussion Points : What is Shadow IT? What are the types of Shadow IT? Practical demo using open source tools Controls to manage shadow IT risk Reason Of Risk : … Read More »(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web
Discover Your Attack Surface Before Hackers Do Not having real time view of your dynamic attack surface and the risks it is introducing, leaves an organization in the dark and serves as a low hanging fruit for attackers to use this exposed information to fuel… Read More »Download Report – (Short Guide) On Attack Surface Analysis
[Report] 9 Critical Capabilities Needed For Digital Risk Protection Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per… Read More »Download Report – 9 Critical Capabilities For Digital Risk Protection Program
End of september, Doordash confirmed a data breach which affected 4.9 million customers, workers, merchants. Doordash is a popular food delivery company and their data was stolen by a group of hackers. They also informed, customers who affected after 5 April 2018 were not affected.… Read More »Doordash Breach (4.9 Million Customers Affected)
In early september, Yves Rocher warned about a data leak of millions of its customers. An exposed database left by a third party vendor was the cause of the breach. A server owned by Aliznet (serves IBM, Salesforce, Sephora, Louboutin) had an exposed database of… Read More »Yves Rocher Breach (2.5 Million Canadian Customers Affected)
8 American Cities were affected by this breach. Click2Gov is a popular software solution used by local governments for receiving parking tickets or taxes. The software was developed by Superion. It’s a popular municipality payment software. Gemini said it had found at least 46 compromised… Read More »Click2Gov Breach (8 American Cities Affected)
American Medical Collection Agency (AMCA) Data Breach : Why It Happened & What Can You Learn? (24 Million Customers Affected)
24 million customers is approximated to be affected through this third party breach. The data breach experienced by American Medical Collection Agency (AMCA), a third-party bill-collection vendor for the health institutions, affected 17 health institutions including the United States’ biggest lab testing companies, Quest and… Read More »American Medical Collection Agency (AMCA) Data Breach : Why It Happened & What Can You Learn? (24 Million Customers Affected)
Cable One Inc. on 16 August 2019, said that a data breach earlier this year could have affected the personal information of some current and former employees, but also could have reached some of those employees’ family members. Although Cable One (NYSE: CABO) said it… Read More »Cable One Data Breach : Why It Happened & What Can You Learn?
Vendor or enterprise third party risk related breaches are at an all time high. Several of the high profile breaches like Uber, Amazon, British Airways & more has been caused due to 3rd party. Most of the major security related framework, guidelines, compliance and regulations has made 3rd party risk management a mandatory part of overall security program. Following are the key steps for building an effective third party risk management (vendor risk management) program.