Malicious Actors Show Little Interest in Automotive Source Code Leak Technical data leakage strikes again, this time affecting a major manufacturer in the automotive industry. Bleeping Computer reported this week that a misconfigured Git server has leaked source code from … Read More
E-commerce et commerce de détail
Rethinking Digital Risk Protection and Mitigation
Rethinking Digital Risk Protection and Mitigation A global pandemic, a fast-growing remote workforce, and reliance on misconfigured cloud-based services are expanding the threat landscape your company is facing. Malicious actors are taking advantage of digital transformation to compromise corporate security … Read More
What do fraudsters want for Christmas in 2020?
What do fraudsters want for Christmas in 2020? ‘Tis the season to be jolly, even though this year has been a challenge, to say the least. While some are thinking about end of year reports and others are looking ahead … Read More
Can a Data Breach Help Protect Your Company?
Can a Data Breach Help Protect Your Company? Cloud services, especially those related to communications, have massively been adopted by corporations, as they have shifted to a remote workforce this year. The poster child for this trend, Zoom, now has … Read More
Thought Reporting a Data Breach Was Easy? Think Again.
When Malicious Actors Turn Your Own Messages Against You When a data breach occurs, most companies contact their customers by email to inform them of what happened, which information may have been compromised, and what the company is doing to … Read More
Less than 10% of data breaches are made public
Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More
Firework: Digital Risk Protection Product Brief
Firework – Product Brief: Digital Risk Protection Download the product document
Top 5 human errors that lead to data breaches
Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More
Solution Brief: Detect Technical Data Leaks
Solution Brief: Technical Data Leaks Detection Download the product document
When Private Photos Don’t Stay Private for Long
When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content benefits from end-to-end encryption, … Read More