It appears that Chinese hackers have been running Cloud Hopper attacks targeting tech providers for access to their customers' corporate intellectual property and government secrets.
Cloud Solution Provider PCM Discloses Client Information Breach Just Days After Insight Acquisition…
Cloud solution provider PCM claimed minimal impact to their customers even though recent breach of Office 365 administrative credentials could lead to exposure of personal data and sensitive business documents.
Third party data breach struck Quest Diagnostics’ billing vendor which exposed patients’ sensitive information including social security numbers and medical information.
About 90 major hotels and resorts worldwide had their security logs exposed in a third party data breach. Source of the breach is ironically from their management company's intrusion detection system.
It’s a reality that companies are outsourcing almost every aspect of their operations thus effective vendor risk management is becoming more crucial, how should you do it?
What are the privacy policies of CDN and infrastructure providers? Are these providers merely providing passive conduits to host vendors’ content or offering more services like user tracking, profiling, and identity matching?
With growing concerns about privacy practices at big Internet providers, FTC has issued orders to AT&T, AT&T Mobility, Comcast Cable, Google Fiber, T-Mobile USA, Verizon and Verizon Wireless to share how they collect, retain, use and disclose information about consumers and their devices.
7 notified Sears, Best Buy, Delta, and other clients using their platform, about a data breach six months after the breach occurred. What should service providers and organizations that contract these third parties be doing better to protect their customers' privacy and personal data?
Executives concerned about secure applications but developers are not confident that they are writing secure code or the security of third party modules.
ICT vendors face privacy and security challenges from different points of view: they need to implement internally but also need to face customer requirements from a product, service and delivery point of view. We need a holistic approach which incorporate security and privacy into the DNA of the company