Remove 2022 Remove Authentication Remove Information Security Remove Network
article thumbnail

Activision Hack Exposes Employee Data and 'Call of Duty' Information

SecureWorld News

It reported that hackers gained access to Activision's network by successfully phishing a privileged user on the network on December 4, 2022. vx-underground also reported that a hacker managed to break into an Activision Slack channel, post offensive messages, and steal information related to upcoming "Call of Duty" releases.

Data 84
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] Zero Trust network security offers cybersecurity benefits vs. traditional perimeter-based network security models.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. The ITRC stats also show that in Q1 2022 alone, nearly half (154 of 367) of data breach notices didn’t include the nature of the breach and were designated “‘unknown”.

article thumbnail

Spotlight on Cybersecurity Leaders: Randy Raw

SecureWorld News

He is the Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. In this installment, we introduce you to Randy Raw.

article thumbnail

How to gain a five star security reputation in hospitality

CIO Business Intelligence

transition Step 1: Locate, identify and document all the credit card flow in the organization, as stated by the following requirements applicable to all entities subject to PCI security compliance: 1.2.4 An accurate data-flow diagram(s) is maintained that meets the following: • Shows all account data flows across systems and networks.

Security 105
article thumbnail

Spotlight on Cybersecurity Leaders: Women in Cybersecurity Delaware Valley

SecureWorld News

After spending 25 years of her career in IT, including more than 17 years in information security, Nancy considers joining the Federal Reserve Bank in 2017 as the highlight of her career. At Comcast as a DevSecOps Transformation Coach, she fosters continuous improvement and sustained adoption of Secure Development Lifecycle practices.

article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO Business Intelligence

The proliferation of cyber threats has become so great that earlier this year the Australian government issued the recommendation that organisations “ urgently ” adopt an enhanced cyber security posture. Data and Information Security Understanding where the threats lie.