With the introduction of the General Data Protection Regulation (GDPR), all organizations who handle personal information for EU citizens must have a strategy in place to identify if data has been exposed or face significant fines and brand damage. One area to focus on is the identification of data loss.
The Five Families: The Most Wanted Ransomware Groups
Last week we presented a webinar on “Emerging Ransomware Threats and How to Protect Your Data”. Here we dis...
Error - something went wrong!
Other content in this Stream
Top Cyber Threats to the Healthcare & Pharmaceutical Sector
Discover the top cyber threats to the healthcare and pharmaceutical industry.
Eliminating Third Party Cyber Risks from Healthcare Delivery
Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.
The State of Cybercrime in the Post-AlphaBay and Hansa Age
Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.
Demystifying the Dark Web and Mitigating Risks
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
Episode 26: Mythbusting Vulnerabilities and Exploits
Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...
Cyber Security as Public Health
Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s ...
Patch Priorities: 10 Vulnerabilities You Should Pay Attention To
Not all vulnerabilities are created equal, and those that have been exploited by threat actors carry more weight. Last month, ...
7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.
Phishing Site Detected and Taken Down
An IT manager of a multinational financial services holding company involved in Investment Banking, Private Banking, and Asset Management discovered a phishing site impersonating their brand.
Security and Privacy: How to grow the relationship
Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.
Security Analyst Spotlight Series: Rafael Amado
Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...
Leveraging the 2018 Verizon Data Breach Investigations Report
Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...
Digital Shadows finds 1.5 billion business and consumer files exposed online
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR regulations.
ESG: The Pressing Need for Digital Risk Management
CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web.
Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics
In this week's edition of ShadowTalk, Dr Richard Gold joins us to discuss the return of the L0pht hackers.
FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar
Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.
The Path to GDPR Compliance
Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.
Account Takeover: Protect Your Customer and Employee Accounts
Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.
[Infographic] 18 Reasons for Digital Risk Management