PCR’s (UK) Top 10 Biggest data breaches of 2020 PCR is a leading information source for IT resellers and distributors in the United Kingdom. It reports its top 10 based on the number of records breached in the incidents selected. They cite the Risk Based...
Healthcare Sector Application Security: Preventing Threats from Becoming Attacks Software security isn’t a state of being, or even a single action; it is a process, and one that requires more than just hardening your software. The year 2020 saw a dramati...
Cybersecurity Trends in Fintech The year 2020 will go down in history as being a year of uncomfortable changes. Just about everyone was forced to approach aspects of personal and professional life differently, from buying groceries to conducting business to m...
The SolarWinds hack was a major security breach that affected over 3,000 SolarWinds customers, including major corporations like Cisco, Intel, Cox Communications, and Belkin. Also impacted were multiple US states and government agencies including the&nbs...
A Timeline of Major Data Breaches in 2019 If there’s no rest for the wicked, there seems to be also no rest for malicious cyber attackers. 2019 has had its fair share of data breaches and many of them have affected the data of millions of people. Let’s ...
Artificial intelligence (AI) is so ingrained in all aspects of modern society that the term is almost meaningless without further clarification. Developers have used AI technology for years to perform various tasks, such as auto-completing search results or r...
High-level programming languages have gone a long way since the invention of Short Code in 1949. New languages are being created all the time, sometimes as a joke, but most times to deal with specific problems that existing ones cannot solve. Althou...
Every year, Kiuwan makes predictions concerning what’s in store for cybersecurity for the coming year based on prior events, current trends, and statistics. While year-end predictions are commonplace, what’s uncommon are follow-ups to see if said ...
How much can a data security breaches really cost a company? What is the cost of a few infiltrated databases and stolen customer account information? The answer ranges between millions and billions of dollars in damages paid to those whose informati...
As new technologies and big data deliver previously unimagined connections and conveniences, the shadow side of cyber threats is also growing. Cybercriminals can scale to unprecedented levels using artificial intelligence (AI) and launch sophisticated attacks...
Cybercrime is an ever-evolving world of constant change as cybercriminals continue to develop increasingly dangerous and sophisticated attacks. In particular, data breaches plagued dozens of well-known organizations around the world in 2018, with the single l...
In the early model of software development, departments and stages were siloed, and tasks were completed independently. In this waterfall method, a clearly defined and well-structured process for software development was laid out before developers wrote the f...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.