Amazon’s Whole Foods Investigating Payment Card Breach

Whole Foods Market, the supermarket chain acquired recently by Amazon for $13.7 billion, informed customers this week that it has launched an investigation after learning that some of its point-of-sale (PoS) systems may have been hacked. The company has provided only few details as the investigation is ongoing. However, it said the incident appears to…

Most cloud services still not GDPR-ready

With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding little change in level of preparedness compared with levels previously reported. Nearly three-quarters of cloud services still lack key capabilities to ensure compliance.

Why end-to-end encryption is about more than just privacy

The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can only have a positive answer. As he told the audience at the FSec security symposium in Varazdin, Croatia, end-to-end encryption is about more than just privacy…

143 Million Affected in Hack of U.S. Credit Agency

A major American credit reporting agency entrusted to safeguard personal financial information said Thursday hackers looted its system in a colossal breach that could affect nearly half the US population as well as people in Britain and Canada. Equifax said that a hack it learned about on July 29 had the potential to affect 143…

The Time for IT Asset Management Is Now

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of…

BH Consulting launches scholarship programme to address infosec skills gap

BH Consulting, an information security specialist company, has launched a Masters Scholarship programme to encourage talented people to enter the cybersecurity market. Under the programme, a successful applicant will start a fulltime traineeship role as an information security analyst, while studying for a fully paid two-year MSc in Applied Cyber Security at the Institute of…

Transatlantic Cable Podcast, Episode 1

Each week, David Buxton and I will break down some useful cybersecurity stories and offer tips in 20 minutes or less. In this week’s podcast, we discuss scams related to Hurricane Harvey relief, why you should change your Instagram password, and the fact that there are no free tickets to paradise on WhatsApp.

How hackers have improved their BEC attack methods

Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion people worldwide will be using email portals by 2019. Each business user will send 126 messages daily by that time, compared to 122 emails sent and…

Location! Location! Location! Managing and Protecting Critical Data in the Age of Sprawl

It should be no surprise to anyone that the digital age has created data sprawl. Information and critical data are no longer confined to desks and filing cabinets in locked rooms, but stretched across the enterprise in locations far and wide. Data locations first expanded to structured databases, then unstructured local user systems and then…