The Human Vector: How Social Media Can Put your Company Risk

The Information Security Layers model tries to map and harden the possible affected exposed vectors of an organization. In the early days it was mostly about external threats, so we all placed firewalls, secure mail gateways, web filtering and intrusion prevention systems to cover any external connectivity such as the internet and intranet connections we had. […]

Read More

Hey hacker, publish my sensitive data. Please!

Isn’t it a shame that we have entered an era where we actually want hackers to publish our sensitive information just so we’ll know we’ve been breached? Many in the field of information security and data leakage prevention know that tons of the most sensitive information stolen from endless amounts of breaches is being dumped by hacker groups and […]

Read More
Uber Data Breach

Another one bites the dust.. and this time Uber!

Uber, which provides a smartphone-based transportation and ride sharing service, says it was the victim of a database breach that compromised personal information of about 50,000 of its U.S. users. “On September 17, 2014, we discovered that one of our databases could potentially have been accessed by a third party,” Katherine Tassi, Uber’s managing counsel […]

Read More
Database of things

The “Database of Things” Generation

Without even knowing from which organization are you, I can (almost) assure you that you have double the databases you think you have! Yes, I know you ran a Database discovery tool, which probably discovered additional dozens of databases you had no idea you had, but this is just the tip of the iceberg! In […]

Read More

The Anthem Data Breach – Making a Long Story Short

Anthem, the second biggest health insurer company, alerted its customers last Wednesday that the personal information of more than 80 Millions of its customers and employees was stolen by database hackers, making it one of the largest data breaches in the health care industry so far. What we know that was stolen so far includes; […]

Read More