Kid’s electronic toy company VTech is now at the centre of a storm over a breach of its user database, which worryingly included the details of 3 million child profiles.
Bad privileged access management at the "root" of VTech woes?
[fa icon="calendar'] Dec 3, 2015 1:17:32 PM / by WALLIX posted in Mitigating External Attacks
Would you hug a hacker? Why demonising cyber-criminals doesn't help
[fa icon="calendar'] Nov 5, 2015 12:16:12 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
In the wake of the Talk Talk hack we heard all kinds of speculation about the motives of these attackers, the methods they might have used and their ultimate goals.
No one likes passwords anymore, but what are the alternatives?
[fa icon="calendar'] Oct 15, 2015 6:06:06 PM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance
The humble password gets a hard time these days. It seems to be responsible for every hack, data breach or act of cyber espionage that we see reported.
Could a threat to “business as usual” be a significant risk to your information security?
[fa icon="calendar'] Sep 24, 2015 5:36:11 PM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance
This week former Morgan Stanley financial advisor Galen Marsh admitted stealing data from the banking giant. He downloaded a total of 730,000 records to his personal computer from 2011 - 2014.
Don’t know how your data breach happened? Your cyber insurance could be worthless
[fa icon="calendar'] Jul 14, 2015 1:53:34 PM / by WALLIX posted in Mitigating External Attacks, Optimizing Cyber-Insurance
For the information security professional a data breach is the worst case scenario but must also be considered an occupational hazard.