article thumbnail

Bodybuilding.com forces password reset after a security breach

Security Affairs

Bad news for fitness and bodybuilding passionates, the popular online retailer Bodybuilding.com announced that hackers have broken into its systems. The popular online retailer website Bodybuilding.com announced last week that hackers have broken into its systems.

Passwords 252
article thumbnail

SEC Announces 2022 Examination Priorities: Private Funds, ESG, Retail, Cyber, Digital Assets Top the List

Data Matters

1 Consistent with its recent rulemaking activity, in its accompanying release, the SEC highlighted private funds; Environmental, Social and Governance (ESG) investing; retail; cyber; and digital assets as key examination priorities. Private Fund, ESG Investing, Retail Investors, Cybersecurity, Fintech, and Digital Assets.

Retail 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

A large retailer may spend millions on cyber security. So we’ve boiled the NIST framework down into a very focused workshop exercise. We bring together 150 or so people into a room for morning and just work through exercises. And they are a big part of the supply chain to large companies.

article thumbnail

Data Subject Access Requests – High Court dismisses claim where DSAR regime abused

DLA Piper Privacy Matters

However, the Judge held that, even if he were wrong on that primary finding of fact and that there had been a failure to provide a proper request to one or more of the DSARs, the court has a discretion whether or not to make an order and, in this case, there were good reasons for declining to exercise the discretion.

Access 122
article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

It can host training, such as capture the flag exercises, demonstrate how known hacks play out, test defensive responses and be utilized for software security testing. Participants competed in exercises to detect improvised explosive devises targeting semi-trucks and military vehicles. College students, U.S.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

Once you know where the data is, how it got there, and its worth (and risk) to your organization, take the time to create a catalog so that your investment in these exercises can immediately generate value for those who need the data to do their job. •Create a data catalog. Conduct risk analysis.

article thumbnail

The Week in Cyber Security and Data Privacy: 27 November – 3 December 2023

IT Governance

Source (New) Professional services USA Yes Unknown Thillens Source (New) Finance USA Yes Unknown Elston-Nationwide Carriers Source (New) Transport USA Yes Unknown American Insulated Glass Source (New) Retail USA Yes Unknown MooreCo Inc.