Threat Modeling for Retail Organizations

Threat Modeling for Retail Organizations

Threat modeling in the retail industry is a proactive process of identifying, evaluating, and addressing cybersecurity threats. It involves considering potential vulnerabilities in the retail supply chain, from individual stores to associated vendors, to protect...
Threat Modeling for Healthcare Organizations

Threat Modeling for Healthcare Organizations

Threat modeling for healthcare organizations involves systematically identifying, assessing, and addressing potential security risks associated with the storage and transmission of sensitive patient data. This proactive approach helps to protect digital health...
An Overlooked Reason Why There are so Many Data Breaches

An Overlooked Reason Why There are so Many Data Breaches

Take a look at the headlines in any security news outlet and one thing really stands out. There are data breaches everywhere. That happen all the time, to organizations that know better. And it’s not like anyone wants a data breach. In fact, just the opposite is true....
The Collateral Damage of a Social Profile Data Breach

The Collateral Damage of a Social Profile Data Breach

The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach.  This article reviews the potential damages that can occur with a social profile...
Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Server on GCS Left Unsecured on the Web, Macy’s and T-Mobile Hacked

Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a focus on the Dark Web, found 1.2 billion records on an unsecured server. A total of 4 terabytes of personal...