Remove 2005 Remove Government Remove Marketing Remove Security
article thumbnail

$10M Is Yours If You Can Get This Guy to Leave Russia

Krebs on Security

government this week put a $10 million bounty on the head of a Russian man who for the past 18 years operated Try2Check , one of the cybercrime underground’s most trusted services for checking the validity of stolen credit card data. Denis Kulkov, a.k.a. “Nordex,” in his Ferrari. Image: USDOJ.

Marketing 239
article thumbnail

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

The Last Watchdog

Related: What we’ve learned from the massive breach of Capitol At RSA 2020 , I learned about how one of the routine daily chores all large organizations perform — data governance — has started to emerge as something of a cybersecurity multiplier. A robust data archiving strategy puts data into tiers, Lahiri says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thales & LuxTrust: A Partnership for Data Sovereignty and Compliance

Thales Cloud Protection & Licensing

Businesses must prioritize this area, particularly when collaborating with third-party providers, ensuring compliance and maintaining a secure digital landscape. As a leading technology provider in the security domain, Thales is delighted to work with MSSPs like LuxTrust to deliver cutting-edge solutions that address these critical needs.

article thumbnail

Canon publicly confirms August ransomware attack and data breach

Security Affairs

The memo also reveals that the company has hired an external security firm to investigate the incident. The hackers accessed company file servers that contained information about current and former employees from 2005 to 2020 and their beneficiaries and dependents. The gang has published a 2.2 ” reads the statement.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

We talk with Casey Ellis, founder and CTO of BugCrowd about how the market for software bugs has changed since the first bug bounty programs emerged nearly 20 years ago, and what’s hot in bug hunting in 2021. The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security Ledger with Paul F.

IoT 98
article thumbnail

Interview with Gus Tugendhat of Tussell

Information Matters

I recently sat down with Gus Tugendhat, founder of UK-based government tenders and contracts data provider, Tussell. Gus told me about the origins of Tussell, the market it is addressing, its data-driven solution for businesses tendering for public sector contracts and the challenges of growing this innovative startup business.

Sales 40
article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 10 August. Only two days after the honeypot was launched, it was attacked by a black-market seller, who installed backdoors that would allow anyone to access it, even if admin passwords were changed. This asset was then, it seems, listed for sale on the xDedic black market.