2015 Data Breach Industry Forecast

NONE | April 26, 2016

article image
The end of a year brings reflection as well as a chance to pause and look to the future. To help businesses understand implications of such changes and navigate the road ahead, Experian® Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015.

Spotlight

Computing System Innovations

"Computing System Innovations (CSI), an INC 5000 company, is an industry leading provider to courts and local/state government agencies with its award winning Intellidact redaction technology, as well as a market leader for leading information technology (IT) and information security (IS) solutions. CSI sets the curve by offering software technologies for automated redaction and unstructured data recognition with docketing and indexing capabilities. Integrated features include: Automated docketing and indexing with redaction; Automatic classification via content and layout; Eyesight image processing; Future Proofing (Future Regulation Protection), and Signature Detection and Removal. Intellidact was the first to market and is the preeminent solution offering the most cost-effective, high-volume, high accuracy technology package with the least amount of manual verification required."

OTHER ARTICLES

Delivering on the promise of security AI to help defenders protect today’s hybrid environments

Article | February 20, 2020

Technology is reshaping society – artificial intelligence (AI) is enabling us to increase crop yields, protect endangered animals and improve access to healthcare. Technology is also transforming criminal enterprises, which are developing increasingly targeted attacks against a growing range of devices and services. Using the cloud to harness the largest and most diverse set of signals – with the right mix of AI and human defenders – we can turn the tide in cybersecurity. Microsoft is announcing new capabilities in AI and automation available today to accelerate that change. Cybersecurity always comes down to people – good and bad. Our optimism is grounded in our belief in the potential for good people and technology to work in harmony to accomplish amazing things. After years of investment and engineering work, the data now shows that Microsoft is delivering on the potential of AI to enable defenders to protect data and manage risk across the full breadth of their digital estates.

Read More

Wormable, Unpatched Microsoft Bug Threatens Corporate LANs

Article | March 11, 2020

Microsoft is warning on a wormable, unpatched remote code-execution vulnerability in the Microsoft Server Message Block protocol – the same protocol that was targeted by the infamous WannaCry ransomware in 2017.The critical bug (CVE-2020-0796) affects Windows 10 and Windows Server 2019, and was not included in Microsoft’s Patch Tuesday release this week. The bug can be found in version 3.1.1 of Microsoft’s SMB file-sharing system. SMB allows multiple clients to access shared folders and can provide a rich playground for malware when it comes to lateral movement and client-to-client infection. This was played out in version 1 of SMB back in 2017, when the WannaCry ransomware used the NSA-developed EternalBlue SMB exploit to self-propagate rapidly around the world.

Read More

Coronavirus and the Cybersecurity Threat Landscape

Article | March 4, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will hit every organization, no matter how resilient they thought they were. No single event to date has changed the tech threat landscape more than the consequences and impacts developing around the Coronavirus (aka SARS-CoV-2 and the disease CoViD-19). Then there are the business consequences, such as the sudden changes in consumer patterns and steep loss of income. The coronavirus is unmistakably a black swan event. It falls outside of the outliers. It creates a situation that many security professionals are familiar with: The Medusa Effect.

Read More

The British government thinks process sensor cyber issues are real – what about everyone else

Article | February 16, 2020

When Joe refers to analogue devices, he is generally referring to ISA99 / IEC 62443 Level 0 devices, i.e. the sensors and actuators required in any cyber physical system. The vulnerability of these devices is often ignored as the security measures required to protect them are not purely technical but also involve physical and personnel security aspects along with process security (both of the metrology and processing by the device, as well as configuration management and control issues over the lifecycle of analogue devices). The security situation is not helped by the simplistic application of the triad of security goals (confidentiality, integrity and availability) to cyber physical systems.

Read More

Spotlight

Computing System Innovations

"Computing System Innovations (CSI), an INC 5000 company, is an industry leading provider to courts and local/state government agencies with its award winning Intellidact redaction technology, as well as a market leader for leading information technology (IT) and information security (IS) solutions. CSI sets the curve by offering software technologies for automated redaction and unstructured data recognition with docketing and indexing capabilities. Integrated features include: Automated docketing and indexing with redaction; Automatic classification via content and layout; Eyesight image processing; Future Proofing (Future Regulation Protection), and Signature Detection and Removal. Intellidact was the first to market and is the preeminent solution offering the most cost-effective, high-volume, high accuracy technology package with the least amount of manual verification required."

Events