Stopping Credential Leaks: A Race Against Time

Stolen credentials are the top hacking tactic for the fourth consecutive year, according to the latest Verizon Data Breach Investigations Report. If this isn’t enough to get the attention of cybersecurity professionals, the report further states that 37% of all data breaches are the result of used or stolen credentials. Each combination of a password

How to Manage Third-Party Digital Risk

The adoption of digital transformation, cloud computing, and outsourcing of physical IT infrastructure streamlined processes and lowered costs; however an unintended consequence is enterprise digital assets are now in the hands of third, fourth, and Nth parties — far outside the corporate security perimeter. Download this whitepaper to learn: – How digital risk is shifting

Full Body Exposure: CybelAngel Analysis of Medical Data Leaks

CybelAngel Analyst Team detected medical devices leaking more than 45 million unique imaging files on unprotected connected storage devices with ties to hospitals and medical centers worldwide. In most cases, the identified leaking device was a Network Attached Storage (NAS). NAS are inexpensive storage solutions used by individuals and small companies, as opposed to renting

Are Unprotected Cloud Databases Leaking Your Data?

Digital Risk is Shifting to the Cloud Cloud services are frequently associated with digital transformation and innovation; however, these services also expand cyber attack surfaces for threat actors to exploit. According to Oracle’s 2020: Top Ten Cloud Predictions1, 7 out of 10 organizations will keep business-critical data in the cloud. While moving to cloud apps