I know I sound like a broken record, but as businesses start to improve their internal security, attackers focus on compromising businesses’ supply chains. In the case of the Hezbollah attack, the attackers must have, some how, known (a) that they were buying new walkie-talkies and pagers, (b) who they were buying them from, (c) […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Organizations manage risk. Risk has a lot of dimensions. Everything from not being able to get raw materials to hurricanes. Possibly your biggest risk is your third party relationships. As companies continue to outsource parts of their supply chain to other companies, those companies have your data. And if those companies get breached, you get […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Different sources are reporting different numbers, but the personal information on between 6 million and 14 million Verizon Wireless customers has been exposed. The information includes name, address, phone number, general information on calls made to customer service and, in some cases, the user’s security PIN. The details of this are going to sound all […]
Continue reading →
[DISPLAY_ACURAX_ICONS]