Wednesday, February 5, 2020

Wawa customer data found for sale on dark web

 
Security Digest
Information security news and advice from TechTarget's network |February 05, 2020
TechTarget
FEATURED STORY
Payment cards from Wawa data breach found on dark web

by Alexander Culafi, News Writer

Payment card information from customers of the convenience store chain Wawa has reportedly gone up for sale on the dark web, though questions about the breach remain

Advertisement
NEWS
 
Social media targeting algorithms need regulation, says CDEI

The Centre for Data Ethics and Innovation recommends regulation of social media algorithms as part of a drive to make user targeting safe and ethical.

 
MI5 faces court ruling over unlawful surveillance warrants

Privacy groups Liberty and Privacy International ask the Investigatory Powers Tribunal to order MI5 to disclose full details of 'unlawful' conduct, after classified documents reveal the spy agency failed to comply with surveillance laws.

EXPERT ADVICE
 
Audit preparation checklist: What compliance auditors want to see

Think your enterprise is ready for its audit? Check off key points in this audit preparation checklist to ensure it has all the resources needed to help auditors do their job.

 
Fresh thinking on cybersecurity threats for 2020
It's a good time to take a clear-eyed view of the likely security threats facing your organization. But then what? Experts suggest getting creative with your threat responses.
 
Data breach costs hit hard; where are you most vulnerable?
Breaking down the cost of a data breach isn't for the faint of heart. But with millions of dollars on the line for a single event, companies also need to have their eyes wide open.
 
Cisco CISO says today's enterprise must take chances
Cisco CISO Steve Martino talks about taking chances, threats, how the security leader's role is changing and what really works when it comes to keeping the company secure.
 
Can IDaaS adoption improve enterprise security posture?
Experts suggest enterprises consider identity as a service as organizations' data management needs grow and access management becomes more complex.
 
Getting the most from cyberthreat intelligence services

A deluge of data is making it tough to put cyberthreat intelligence to work. This issue of 'Information Security' magazine focuses on what data makes a difference.

 
Threat intelligence offers promise, but limitations remain
Do you know how to use threat intelligence feeds to best effect in your company? Learn what this valuable yet often confusing resource can and can't do for cybersecurity.
 
CISOs face a range of cybersecurity challenges in 2020
Every company is unique, of course, but certain challenges are widely shared. Learn what security concerns other CISOs and security leaders are focused on in 2020.
 
2 components of detection and threat intelligence platforms
Deploying threat detection and intelligence platforms is one of the smartest ways to protect your organization's valuable assets. Make sure you know how to choose the best tool.
 
In-house vs. outsourced cybersecurity operations center capabilities
Cybersecurity operations centers have become an essential element of threat detection. Here's how to decide whether to build one in-house or outsource these capabilities.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: