CINXE.COM

<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8" data-next-head=""/><meta name="viewport" content="width=device-width" data-next-head=""/><meta name="twitter:card" content="summary_large_image" data-next-head=""/><meta name="twitter:site" content="@SCMagazine" data-next-head=""/><meta property="og:site_name" content="SC Media" data-next-head=""/><title data-next-head="">Data Security | SC Media</title><meta name="robots" content="index,follow" data-next-head=""/><meta name="description" content="Articles on Data Security" data-next-head=""/><meta property="og:title" content="Data Security" data-next-head=""/><meta property="og:description" content="Articles on Data Security" data-next-head=""/><meta property="og:url" content="https://www.scworld.com/topic/data-security" data-next-head=""/><meta property="og:type" content="website" data-next-head=""/><meta property="og:image" content="https://www.scworld.com/images/fallback-image.png" data-next-head=""/><meta property="og:locale" content="en_US" data-next-head=""/><link rel="canonical" href="https://www.scworld.com/topic/data-security" data-next-head=""/><link rel="manifest" href="/manifest.json"/><meta name="theme-color" content="#ee1c25"/><link rel="shortcut icon" href="/favicon.ico" type="image/x-icon"/><link rel="apple-touch-icon" sizes="57x57" href="/images/logo/icons/apple-touch-icon-57x57.png"/><link rel="apple-touch-icon" sizes="72x72" href="/images/logo/icons/apple-touch-icon-72x72.png"/><link rel="apple-touch-icon" sizes="76x76" href="/images/logo/icons/apple-touch-icon-76x76.png"/><link rel="apple-touch-icon" sizes="114x114" href="/images/logo/icons/apple-touch-icon-114x114.png"/><link rel="apple-touch-icon" sizes="120x120" href="/images/logo/icons/apple-touch-icon-120x120.png"/><link rel="apple-touch-icon" sizes="144x144" href="/images/logo/icons/apple-touch-icon-144x144.png"/><link rel="apple-touch-icon" sizes="152x152" href="/images/logo/icons/apple-touch-icon-152x152.png"/><link rel="apple-touch-icon" sizes="180x180" href="/images/logo/icons/apple-touch-icon-180x180.png"/><link rel="apple-touch-icon" href="/images/logo/icons/apple-touch-icon.png"/><link rel="preconnect" href="//lytics.cyberriskalliance.com"/><link rel="preconnect" href="//securepubads.g.doubleclick.net"/><link rel="preconnect" href="https://api.cyberriskalliance.com"/><link rel="preconnect" href="https://image-optimizer.cyberriskalliance.com"/><link rel="dns-prefetch" href="//ml314.com"/><link rel="dns-prefetch" href="//snap.licdn.com"/><link rel="preload" href="/_next/static/media/ce4f1498be4b08e7-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/140d7ede024f369d-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/0f3a385557f1712f-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/media/47cbc4e2adbc5db9-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/css/d8dff65e1e4327f9.css" as="style"/><link rel="preload" href="/_next/static/css/596a576e07cd84b0.css" as="style"/><link rel="preload" href="/_next/static/css/f934051253f7b1f7.css" as="style"/><link rel="preload" href="/_next/static/css/caeaa11e0e78aed2.css" as="style"/><link rel="preload" href="/_next/static/css/bc90709fce58dfab.css" as="style"/><script type="application/ld+json" data-next-head="">{"@type":"PostalAddress","@id":"https://cyberriskalliance.com#postalAddress","addressCountry":"US","addressRegion":"NY","postalCode":"10017","streetAddress":"400 Madison Ave","@context":"https://www.schema.org"}</script><script type="application/ld+json" data-next-head="">{"@type":"Organization","@id":"https://cyberriskalliance.com#organization","name":"CyberRisk Alliance","url":"https://cyberriskalliance.com","legalName":"CyberRisk Alliance LLC","address":{"@id":"https://cyberriskalliance.com#postalAddress"},"contactPoint":[{"@type":"ContactPoint","contactType":"Sales and sponsorships","email":"sales@cyberriskalliance.com"}],"@context":"https://www.schema.org"}</script><script type="application/ld+json" data-next-head="">{"@type":"Organization","@id":"https://https://www.scworld.com#Organization","name":"SC Media","alternateName":["SC Magazine","SC Events"],"address":{"@id":"https://cyberriskalliance.com#postalAddress"},"additionalType":"NewsMediaOrganization","description":"The essential resource for independent news analysis, forward-looking features, product reviews, events, and professional recognition programs. Sharing insight and guidance in partnership with, and for, top-level information security executives and their technical teams.","slogan":"The latest in-depth, unbiased news, analysis and perspective to keep cybersecurity professionals informed, educated and enlightened about the market.","url":"https://www.scworld.com","parentOrganization":{"@id":"https://cyberriskalliance.com#organization"},"memberOf":{"@id":"https://cyberriskalliance.com#organization"},"brand":[{"@type":"Brand","name":"SC Awards","alternateName":["Excellence Awards","Leadership Awards","Trust Awards"],"url":"https://https://www.scworld.com/sc-awards","description":"Honoring the best in cybersecurity, the SC Awards recognize the people, products and companies that are forging the industry’s future and advancing the cause of safe and secure commerce and communications."},{"@type":"Brand","name":"Women in IT Security","url":"https://https://www.scworld.com/women-in-it-security","description":"Celebrating significant and consequential contributions to the field and community, the SC Media Women in IT Security program honors leaders who have faced down the security challenges, shaped the industry, and made a positive impact on the advancement of cybersecurity in government or the private sector."}],"@context":"https://www.schema.org"}</script><script type="application/ld+json" data-next-head="">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":0,"item":{"@id":"https://www.scworld.com/","name":"SC Media"}},{"@type":"ListItem","position":1,"item":{"@id":"https://www.scworld.com/topics","name":"Topics"}},{"@type":"ListItem","position":2,"item":{"@id":"https://www.scworld.com/topic/data-security","name":"Data Security"}}]}</script><link rel="stylesheet" href="/_next/static/css/d8dff65e1e4327f9.css" data-n-g=""/><link rel="stylesheet" href="/_next/static/css/596a576e07cd84b0.css" data-n-p=""/><link rel="stylesheet" href="/_next/static/css/f934051253f7b1f7.css"/><link rel="stylesheet" href="/_next/static/css/caeaa11e0e78aed2.css"/><link rel="stylesheet" href="/_next/static/css/bc90709fce58dfab.css"/><noscript data-n-css=""></noscript><script defer="" noModule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script defer="" src="/_next/static/chunks/9501-2558e865f64375a2.js"></script><script defer="" src="/_next/static/chunks/3313-6b81be4aeb919235.js"></script><script defer="" src="/_next/static/chunks/1402-4cd07987beee76cf.js"></script><script defer="" src="/_next/static/chunks/3109-fd04cf023b5c8aae.js"></script><script defer="" src="/_next/static/chunks/4477-7df404569341775c.js"></script><script defer="" src="/_next/static/chunks/4418-35f49690ec929b6a.js"></script><script defer="" src="/_next/static/chunks/1085.0efa812e20d55421.js"></script><script defer="" src="/_next/static/chunks/190.6ac4174b7476f23d.js"></script><script defer="" src="/_next/static/chunks/1433-e56fd354a1956d74.js"></script><script defer="" src="/_next/static/chunks/8054.f48d9d43980cd772.js"></script><script defer="" src="/_next/static/chunks/6180.57fa9ed7ba58c63e.js"></script><script defer="" src="/_next/static/chunks/7015-683436d4b576b89a.js"></script><script defer="" src="/_next/static/chunks/2847.c12902f6d1b5c7aa.js"></script><script src="/_next/static/chunks/webpack-9eebcf524037d635.js" defer=""></script><script src="/_next/static/chunks/framework-81e8ebc550651427.js" defer=""></script><script src="/_next/static/chunks/main-5e1d16184ea61a1a.js" defer=""></script><script src="/_next/static/chunks/pages/_app-f46f52cef4470160.js" defer=""></script><script src="/_next/static/chunks/4747-b4b650eb13c0022a.js" defer=""></script><script src="/_next/static/chunks/3954-bbbf608d63230ab3.js" defer=""></script><script src="/_next/static/chunks/6271-d15ff63c8ee12dea.js" defer=""></script><script src="/_next/static/chunks/7313-00469d7521f4fff2.js" defer=""></script><script src="/_next/static/chunks/1866-439271cfbd9e4df5.js" defer=""></script><script src="/_next/static/chunks/4052-9a386015c4601e4d.js" defer=""></script><script src="/_next/static/chunks/8170-11d63de283fd2288.js" defer=""></script><script src="/_next/static/chunks/312-4972636f64c86ea1.js" defer=""></script><script src="/_next/static/chunks/3687-da853c844363ad66.js" defer=""></script><script src="/_next/static/chunks/634-2870409fb797f686.js" defer=""></script><script src="/_next/static/chunks/373-8249dff5bbfbd5f8.js" defer=""></script><script src="/_next/static/chunks/8106-75adc5f7c1ab715c.js" defer=""></script><script src="/_next/static/chunks/pages/topic/%5Bslug%5D/%5Bpage%5D-9f6da4651e309e44.js" defer=""></script><script src="/_next/static/OIcz40-rMM-pRHqABsv_n/_buildManifest.js" defer=""></script><script src="/_next/static/OIcz40-rMM-pRHqABsv_n/_ssgManifest.js" defer=""></script></head><body class="__variable_c527de __variable_90946a"><meta name="googlebot" content="index,follow"/><link href="https://www.scworld.com/feed/topic/data-security" rel="alternate" type="application/atom+xml" title="RSS Feed for Data Security"/><link rel="next" href="/topic/data-security/2"/><div id="__next"><div class="__variable_c527de __variable_90946a"><div class="d-flex flex-column min-vh-100"><header class="HeaderWrapper_wrapper__tFRA6 header-wrapper fixed-top font-heading-semibold"><nav role="banner" class="HeaderWrapper_menuHeader__AikIr vw-100 mw-100 align-self-center px-0 px-xl-2 py-2 navbar navbar-expand-xl navbar-light"><div class="HeaderWrapper_navBarWrapper__hGsMc container-xxl"><button aria-controls="collapsable" type="button" aria-label="Toggle navigation" class="navbar-toggler collapsed"><span class="navbar-toggler-icon"></span></button><div class="Branding_navbarBrand__CDT91 Branding_centered__56XIV me-0 order-first"><a title="SC Media" href="/" class="d-block w-fit me-0 navbar-brand"><svg xmlns="http://www.w3.org/2000/svg" id="HeaderLogo_svg__SC" viewBox="12.28 17.02 422.27 164.72"><defs><style>.HeaderLogo_svg__cls-3{fill:gray}</style></defs><circle cx="94.62" cy="99.37" r="82.33" style="fill:#ee1c25"></circle><path d="M105.67 116.39c3.73 3.82 8.61 5.68 14.65 5.68 7.1 0 13.23-3.37 16.16-8.79l10.57 6.13c-5.33 8.97-15.36 14.65-26.73 14.65-9.32 0-17.05-3.11-23.18-9.32-2.26-2.29-4.09-4.78-5.51-7.46-.44 4.85-2.52 8.74-6.21 11.72-4.17 3.38-9.59 5.06-16.25 5.06-12.34 0-20.96-5.86-24.42-15.36l10.48-6.13c2.4 6.3 7.19 9.5 14.3 9.5s9.95-2.75 9.95-6.57c0-2.22-.98-3.91-2.93-5.06-1.96-1.24-5.42-2.57-10.48-4-5.59-1.69-8.97-3.02-12.88-5.77-3.82-2.84-5.86-7.1-5.86-12.79s1.95-10.12 5.95-13.41c4-3.37 8.88-5.06 14.48-5.06 10.04 0 17.94 5.15 22.2 13.94l-10.3 5.95c-2.49-5.33-6.48-7.99-11.9-7.99-5.06 0-8.17 2.58-8.17 6.22 0 1.95.8 3.55 2.4 4.8 1.69 1.15 4.8 2.49 9.41 3.91l4.26 1.42c.98.27 2.31.8 4 1.51 1.69.62 3.02 1.24 3.91 1.87 1.35.83 3.2 2.23 4.56 3.74-.08-.99-.12-2-.12-3.03 0-9.15 3.02-16.87 9.15-23 6.13-6.22 13.85-9.32 23.18-9.32 11.28 0 21.4 5.68 26.73 14.65l-10.57 6.13c-3.11-5.59-9.06-8.88-16.16-8.88-6.04 0-10.92 1.86-14.65 5.68-3.64 3.82-5.51 8.7-5.51 14.74s1.87 10.83 5.51 14.65Z" style="fill:#fff"></path><path d="M259.02 68.06v62.16h-10.21V85.91l-18.92 31.26h-1.24l-18.92-31.35v44.4h-10.21V68.06h11.01l18.74 31.08 18.83-31.08h10.92ZM274.6 112.1c1.42 6.75 6.84 10.48 14.21 10.48 5.06 0 8.88-1.87 11.46-5.51l7.9 4.62c-4.35 6.48-10.83 9.68-19.45 9.68-7.19 0-13.05-2.22-17.5-6.57-4.44-4.44-6.66-10.04-6.66-16.79s2.22-12.17 6.57-16.61c4.35-4.53 10.04-6.75 16.87-6.75 6.48 0 11.81 2.31 15.99 6.84 4.17 4.53 6.31 10.12 6.31 16.61 0 .98-.09 2.31-.36 4H274.6Zm26.02-7.81c-1.33-7.19-6.39-10.92-12.7-10.92-7.1 0-12.08 4.17-13.41 10.92h26.11ZM351.86 68.06h9.59v62.16h-9.59v-6.39c-3.64 5.06-8.79 7.55-15.54 7.55-6.13 0-11.28-2.22-15.63-6.75-4.35-4.53-6.48-10.12-6.48-16.61s2.13-12.08 6.48-16.61c4.35-4.53 9.5-6.75 15.63-6.75 6.75 0 11.9 2.49 15.54 7.46V68.05Zm-14.03 54.17c4 0 7.37-1.33 10.04-4 2.66-2.75 4-6.13 4-10.21s-1.33-7.46-4-10.12c-2.66-2.75-6.04-4.08-10.04-4.08s-7.37 1.33-10.04 4.08c-2.66 2.67-4 6.04-4 10.12s1.33 7.46 4 10.21c2.66 2.66 6.04 4 10.04 4ZM371.84 77.38c-2.4-2.49-2.4-6.22 0-8.61a6 6 0 0 1 8.7 0c2.4 2.4 2.4 6.13-.09 8.61-2.4 2.4-6.13 2.4-8.61 0Zm-.44 52.84v-44.4h9.59v44.4h-9.59ZM424.95 85.82h9.59v44.4h-9.59v-6.39c-3.64 5.06-8.79 7.55-15.54 7.55-6.13 0-11.28-2.22-15.63-6.75-4.35-4.53-6.48-10.12-6.48-16.61s2.13-12.08 6.48-16.61c4.35-4.53 9.5-6.75 15.63-6.75 6.75 0 11.9 2.49 15.54 7.46v-6.31Zm-14.03 36.41c4 0 7.37-1.33 10.04-4 2.66-2.75 4-6.13 4-10.21s-1.33-7.46-4-10.12c-2.66-2.75-6.04-4.08-10.04-4.08s-7.37 1.33-10.04 4.08c-2.66 2.67-4 6.04-4 10.12s1.33 7.46 4 10.21c2.66 2.66 6.04 4 10.04 4Z"></path><path d="m214.78 167.39-1.34-3.85h-8.14l-1.34 3.85h-3.42l6.94-19.12h3.77l6.91 19.12h-3.39Zm-8.44-6.8h6.06l-3.03-8.63-3.03 8.63ZM227.85 164.9c-1.88-1.91-2.84-4.26-2.84-7.07s.96-5.16 2.84-7.05c1.89-1.91 4.29-2.87 7.16-2.87 3.47 0 6.58 1.75 8.22 4.56l-2.73 1.59c-1.01-1.89-3.08-3.09-5.49-3.09-2.05 0-3.69.66-4.97 1.94-1.26 1.28-1.89 2.92-1.89 4.92s.63 3.63 1.89 4.91c1.28 1.28 2.92 1.94 4.97 1.94 2.4 0 4.51-1.2 5.49-3.09l2.73 1.56c-.79 1.39-1.94 2.51-3.41 3.36-1.45.82-3.06 1.23-4.81 1.23-2.87 0-5.27-.96-7.16-2.84ZM256.18 167.39l-4.04-6.96h-3.71v6.96h-3.14v-19.12h7.64c1.72 0 3.17.6 4.34 1.8 1.2 1.17 1.8 2.62 1.8 4.34 0 2.43-1.53 4.64-3.8 5.54l4.34 7.43h-3.44Zm-7.76-16.17v6.39h4.51c1.67 0 3-1.42 3-3.2s-1.34-3.2-3-3.2h-4.51ZM273.94 167.39l-1.34-3.85h-8.14l-1.34 3.85h-3.42l6.94-19.12h3.77l6.91 19.12h-3.39Zm-8.44-6.8h6.06l-3.03-8.63-3.03 8.63ZM327.44 167.39l-4.04-6.96h-3.71v6.96h-3.14v-19.12h7.64c1.72 0 3.17.6 4.34 1.8 1.2 1.17 1.8 2.62 1.8 4.34 0 2.43-1.53 4.64-3.8 5.54l4.34 7.43h-3.44Zm-7.76-16.17v6.39h4.51c1.67 0 3-1.42 3-3.2s-1.34-3.2-3-3.2h-4.51ZM334.17 161.82c.44 2.07 2.1 3.22 4.37 3.22 1.56 0 2.73-.57 3.52-1.69l2.43 1.42c-1.34 1.99-3.33 2.98-5.98 2.98-2.21 0-4.01-.68-5.38-2.02-1.37-1.37-2.05-3.09-2.05-5.16s.68-3.74 2.02-5.11c1.34-1.39 3.08-2.07 5.19-2.07 1.99 0 3.63.71 4.92 2.1 1.28 1.39 1.94 3.11 1.94 5.11 0 .3-.03.71-.11 1.23h-10.87Zm8-2.4c-.41-2.21-1.97-3.36-3.9-3.36-2.19 0-3.71 1.29-4.12 3.36h8.03ZM351.87 159.27c2.1.46 4.83 1.34 4.78 4.26 0 1.31-.52 2.35-1.53 3.09-1.01.74-2.27 1.12-3.8 1.12-2.7 0-4.7-1.2-5.57-3.2l2.54-1.47c.46 1.31 1.47 1.97 3.03 1.97s2.32-.52 2.32-1.53c0-.87-1.15-1.39-2.59-1.75-2.05-.52-4.81-1.34-4.75-4.2 0-1.26.46-2.27 1.42-3.03.96-.76 2.16-1.15 3.58-1.15 2.27 0 4.1 1.07 5.05 2.84l-2.49 1.39c-.46-1.04-1.34-1.56-2.57-1.56-1.12 0-1.99.49-1.99 1.45 0 .9 1.15 1.37 2.57 1.77ZM359.69 165.67c-1.39-1.39-2.1-3.08-2.1-5.11s.71-3.72 2.1-5.11c1.39-1.39 3.11-2.07 5.11-2.07s3.71.68 5.11 2.07c1.39 1.39 2.1 3.09 2.1 5.11s-.71 3.71-2.1 5.11c-1.39 1.39-3.09 2.08-5.11 2.08s-3.71-.68-5.11-2.08Zm5.11-.79c1.2 0 2.21-.41 3.03-1.23.82-.82 1.23-1.86 1.23-3.08s-.41-2.27-1.23-3.09c-.82-.82-1.83-1.23-3.03-1.23s-2.21.41-3.03 1.23c-.82.82-1.23 1.86-1.23 3.09s.41 2.27 1.23 3.08c.82.82 1.83 1.23 3.03 1.23ZM383.35 153.73h2.95v13.66h-2.95v-1.75c-.9 1.39-2.29 2.1-4.23 2.1-3.14 0-5.24-2.13-5.24-5.63v-8.39h2.95v8.09c0 2.05 1.17 3.17 3.06 3.17 2.07 0 3.47-1.28 3.47-3.93v-7.32ZM392.15 156.03c.74-1.69 2.16-2.54 4.2-2.54v3.2c-1.12-.08-2.1.19-2.95.82-.85.6-1.26 1.61-1.26 3v6.88h-2.95v-13.66h2.95v2.29ZM398.65 165.67c-1.37-1.39-2.05-3.08-2.05-5.11s.68-3.74 2.05-5.11 3.11-2.07 5.16-2.07c2.65 0 5 1.37 6.09 3.52l-2.54 1.47c-.63-1.31-1.94-2.1-3.58-2.1-1.2 0-2.21.41-3.03 1.23-.79.82-1.2 1.83-1.2 3.06s.41 2.24 1.2 3.06c.82.82 1.83 1.23 3.03 1.23 1.61 0 2.98-.82 3.63-2.1l2.54 1.45c-1.17 2.19-3.5 3.55-6.14 3.55-2.05 0-3.77-.68-5.16-2.08ZM413.65 161.82c.44 2.07 2.1 3.22 4.37 3.22 1.56 0 2.73-.57 3.52-1.69l2.43 1.42c-1.34 1.99-3.33 2.98-5.98 2.98-2.21 0-4.01-.68-5.38-2.02-1.37-1.37-2.05-3.09-2.05-5.16s.68-3.74 2.02-5.11c1.34-1.39 3.08-2.07 5.19-2.07 1.99 0 3.63.71 4.92 2.1 1.28 1.39 1.94 3.11 1.94 5.11 0 .3-.03.71-.11 1.23h-10.87Zm8-2.4c-.41-2.21-1.97-3.36-3.9-3.36-2.19 0-3.71 1.29-4.12 3.36h8.03ZM294.75 173.45c-.08 0-.16-.03-.23-.07l-10.86-7.75a.46.46 0 0 1-.16-.23l-3.61-16.17c-.04-.17.04-.35.2-.43l14.48-7.88c.12-.06.26-.06.38 0l14.46 7.88c.15.08.23.26.2.43L306 165.42c-.02.1-.08.18-.16.24l-10.85 7.73a.39.39 0 0 1-.23.07Zm.55-7.66v6.02l8.45-6.02h-8.45Zm-9.54 0 8.43 6.01v-6.01h-8.43Zm9.84-1.11h9.01l-4.51-10.01-4.51 10.01Zm-10.72 0h9.01l-4.51-10.01-4.51 10.01Zm5.35-10.8 4.51 10.02 4.51-10.02h-9.02Zm10.63-.21 4.43 9.84 2.97-13.28-7.39 3.45Zm-19.62-3.45 2.97 13.28 4.43-9.83-7.39-3.45Zm9 2.57h9.02l-4.51-10.01-4.51 10.01Zm-8.57-3.59 7.42 3.47 4.48-9.96-11.91 6.49Zm14.26-6.49 4.48 9.95 7.43-3.46-11.91-6.49Z" class="HeaderLogo_svg__cls-3"></path></svg></a></div><div class="Header_ssoColumn__IISom order-4 order-md-last mt-1 navbar-nav"><span class="SsoHeader_greetingsWrapper__VkCCc" style="min-width:15%;min-height:1px"></span></div><div class="justify-content-center order-last order-xl-0 navbar-collapse collapse" id="collapsable"><div class="nav-fill d-flex navbar-nav"><div class="position-static nav-item MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3"><a href="/ciso-stories" data-rr-ui-event-key="/ciso-stories" class="nav-link nav-link">CISO Stories</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158181" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Topics</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="748154" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Topic Hubs</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158205" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Events</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="466202" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Podcasts</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158213" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Research</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="158217" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">Recognition</a></div><div class="position-static dropdown-underline MenuItem_navItem__pk_pn MenuItem_navRootElement__VPea3 nav-item dropdown"><a id="476722" aria-expanded="false" role="button" class="dropdown-toggle nav-link" tabindex="0" href="#">About</a></div></div></div><div class="Header_search__lGf0E"><button class="InlineSearch_toggle__k4nSw border-0 px-2 mx-1 search-toggle" aria-labelledby="header-search-bar-toggle"><svg xmlns="http://www.w3.org/2000/svg" fill="none" stroke="currentColor" aria-hidden="true" viewBox="-2 -2 20 20" width="20" height="20" class="InlineSearch_icon__Nu2iI"><circle cx="6.5" cy="6.5" r="5.75" stroke-width="1.5"></circle><path stroke-linecap="round" stroke-width="1.5" d="M11.061 11 15 14.939"></path></svg><span id="header-search-bar-toggle" hidden="">Open<!-- --> Search Bar</span></button></div></div></nav></header><main class="flex-grow-1 d-flex flex-column"><div class="Topic_topicWrapper__m5QlN"><div class="Placeholder_base__bMucx slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column p-0 position-fixed left-0 skin dfp-slot ad align-items-center"><div class=""><div class="mx-auto" id=":R58m:"></div></div></div><div class="Topic_topic__YIB5e"><div class="Placeholder_base__bMucx Placeholder_leaderboard__4YqCq Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column dfp-slot ad align-items-center"><div class="my-auto"><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":R1d8m:"></div></div></div><div class="col-md-7 offset-md-2"><div class="typography-v2"><h1 class="Topic_titleTexts__Wo7Se px-3 mb-1">Data Security<!-- --><a title="RSS Feed for Data Security" class="ms-2 cursor-pointer icon-primary" href="https://www.scworld.com/feed/topic/data-security" rel="alternate" type="application/atom+xml"><svg xmlns="http://www.w3.org/2000/svg" width="18px" height="18px" fill="currentColor" viewBox="0 0 24 24" class="mb-1"><path d="M6.503 20.752A3.25 3.25 0 0 1 3.252 24 3.25 3.25 0 0 1 0 20.752a3.25 3.25 0 0 1 3.252-3.248 3.25 3.25 0 0 1 3.251 3.248zM0 8.18v4.811c6.05.062 10.96 4.966 11.022 11.009h4.817C15.777 15.29 8.721 8.242 0 8.18zm0-3.368C10.58 4.858 19.152 13.406 19.183 24H24C23.97 10.769 13.245.046 0 0v4.812z"></path></svg></a></h1><h6 class="Topic_titleTexts__Wo7Se font-body text-xlarge px-3 fw-normal"></h6><div class="d-inline-flex"><a class="Topic_tabsText___onUv underlined-text font-body mx-3 text-large my-auto mb-1" href="/topic/data-security">Most Recent</a><div class="YearsTab_tabsText__01BA1 font-body d-flex position-relative text-large my-auto mb-1 cursor-pointer">Archive<svg xmlns="http://www.w3.org/2000/svg" width="4" height="8" fill="none" viewBox="0 0 4 8" class="mx-2 align-self-center"><path fill="#000" fill-rule="evenodd" stroke="#666" stroke-width="0.5" d="M.323.823a.25.25 0 0 1 .354 0l3 3a.25.25 0 0 1 0 .354l-3 3a.25.25 0 0 1-.354-.354L3.146 4 .323 1.177a.25.25 0 0 1 0-.354Z" clip-rule="evenodd"></path></svg></div>NaN</div></div></div><div class="content content-2-7-3 container-xxl"><div class="row"><div class="Regions_contentColumn__zwode content-column col-md-2"><div itemScope="" itemType="https://schema.org/Collection" class="px-3 px-md-4 py-3 py-md-4 mt-0 mb-0 typography-v2"><h3 itemProp="name" class="fs-4 shallow-fs-4 underlined-text BlockWrapper_blockHeader__7q7cS">Related events</h3><div class="SidebarList_basicList__ct6q8 sidebar-list col"><ul class="list-unstyled mb-0 p-0 gx-0 tmt-3"><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemScope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemScope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemScope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scworld.com/cybercast/improving-your-organizations-data-security-posture"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/improving-your-organizations-data-security-posture"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Improving Your Organization’s Data Security Posture</h5></a><p class="mb-0"><meta itemProp="startDate" content="2024-05-23T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-05-23T15:00:00.000-04:00"/><span class="text-small text-muted font-weight-semibold non-interactive">On-Demand Event</span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemScope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemScope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemScope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scworld.com/cybercast/how-to-deploy-cyber-applications-on-your-security-data-lake"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/how-to-deploy-cyber-applications-on-your-security-data-lake"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">How to Deploy Cyber Applications on Your Security Data Lake</h5></a><p class="mb-0"><meta itemProp="startDate" content="2024-07-17T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-07-17T15:00:00.000-04:00"/><span class="text-small text-muted font-weight-semibold non-interactive">On-Demand Event</span></p></div></li><li class="SidebarList_basicBlock__xh21n row pb-2 gx-0 mb-1 mb-xl-2" itemScope="" itemType="https://schema.org/Event"><div class="gx-0 col-xl"><meta itemProp="eventStatus" content="https://schema.org/EventScheduled"/><meta itemProp="eventAttendanceMode" content="https://schema.org/OnlineEventAttendanceMode"/><div itemProp="organizer" itemScope="" itemType="https://schema.org/Organization"><meta itemProp="url" content="https://cyberriskalliance.com#organization"/><meta itemProp="name" content="CyberRisk Alliance"/></div><div itemProp="location" itemScope="" itemType="https://schema.org/VirtualLocation"><meta itemProp="url" content="https://www.scworld.com/cybercast/beyond-the-buzzwords-choosing-essential-tools-for-your-security-stack"/></div><span class="SidebarList_blockTag__oH4I4 layout-title-small non-interactive">Cybercast</span><a itemProp="url" href="/cybercast/beyond-the-buzzwords-choosing-essential-tools-for-your-security-stack"><h5 itemProp="name" class="cursor-pointer tmt-1 mb-0">Beyond the Buzzwords: Choosing Essential Tools for Your Security Stack</h5></a><p class="mb-0"><meta itemProp="startDate" content="2024-10-03T14:00:00.000-04:00"/><meta itemProp="endDate" content="2024-10-03T15:00:00.000-04:00"/><span class="text-small text-muted font-weight-semibold non-interactive">On-Demand Event</span></p></div></li></ul></div></div></div><div class="Regions_contentColumn__zwode content-column col-md-7"><section itemScope="" itemType="https://schema.org/Collection" class="ContentTeaser_sectionWrapper__MJJCo teaser-list"><div class="py-3 py-md-4 mt-0 mb-0"><div class="teaser-list-wrapper"><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/key-distributors-of-encrypted-communication-service-sky-ecc-arrested"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Nigerian Nationals Arrested" loading="lazy" width="2560" height="1791" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 2560 1791&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRpoDAABXRUJQVlA4II4DAABQEACdASoyACMAPmEokUUkIqGWpJBABgSgC+e8eLEKCpbz1Xoi3lyPs8YnIz7NUC+0t9+XVwA0t2Pj0S88yoR+tXWN9GMR7dw2bSgCtn8m40VrH6a+sh0xexPoAoVCQLgCZd18oQC6e2fzIIBavjBdA921a0oc301PAvM/HkC01DH/iafLcBiPeuqQAP7u391RNJlYbj/cmilCuTEfGX1kfhQQqbFMUllu9CgiAFAwfVmExL+W1WLySHkK1bhjPM0pTkzKNSkBZsz7zE8GH0a3XCEfTWDjZYwVCJiJdjHUelxn/5zQhBLVHuekj17gCNHBlEDKNEfmxo2vZkpBqtub0N27/IpHhHUUEL4p2xPRuRKHnsGg/PoD3mJfUjrX9PD5ZTHgzvvj/tIX9Kt3s22OShJZWajP8QiLPevNsFp+6slpH73DIIc6wamJ8WeAJCxQfvkF+Lj7aiDwHlJSF0ZiFJlcc+KjYxDOUaoFJIR3zW6aSYTwscb7TlUJ5dQWiXYkid7xxa5/rydzCzvNai2V+rnMLZarrD802dQfufq30upCs9t3uzOZdISXo2opo07sTb6wjsRfiRUDYZ9u2bTD/oR/6k/7lqmTmx6NB8QN/rLZSjT5+WQ77LcoyER151ECW+0QwePSWhd26BB4j8GLilw0SXq7Ykm+fpDc3PIUzzSdd8TGelXeuNyCy0c9yybIsY8bqVFRVKZuV1NEhi7x2UR9qZjVhu21lUyAuyIUxnM32OiMOQ4waIR8PdyTB375rsk7mu+BcLhBnxoSnxFZVl4lk5+8iiAip/NAkjEG8pSbeFnzDLslSNhrZi4GpALKsGZmPsaBj/yuTrs1eBUqTD1USB7vtHNoUxxRVxf2WzwDYlCfliVpix9WPi0zF5ddz2pI6DN9UtwbpiyKlslbg2SvwvSfLE9vrjleMErT/FJn/gRXx6ughgXdMzHNnkDVKYQ8i3AOp1jF9B6B97fEg8vFMH1zdCsLkIl75kd0F0QFFTT9GOTAW9DXz5iXkAFSv8vAhJI/yVSGvZ+uVwZbMbyylUaCsrn9ntd7+lZTKX7Grj4z4kwGwTcsYcpkfddnuWJjwI8MJLUGQlBXFzUe27bqY2iNThqt9e860AM084Xij6M4Nk67sax8xlnAQqD+dxgJz4qsQLIHrWTxuqe0/rXzvIUDFiz1R2UDrANGn+RubDkMvKMABYAAAAAA&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/encryption">Encryption</a></div><a href="/brief/key-distributors-of-encrypted-communication-service-sky-ecc-arrested"><h5 itemProp="headline" class="font-heading">Key distributors of encrypted communication service Sky ECC arrested</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-14T10:22:00.000-05:00">February 14, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Spanish police identified two of the suspects as the service’s top global distributors, having earned over $14 million from subscription sales.</p> </div></div></div></div></article><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/doges-moves-on-government-data-raises-security-concerns"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Elon Musk" loading="lazy" width="1600" height="900" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1600 900&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/government-regulations">Government Regulations</a></div><a href="/brief/doges-moves-on-government-data-raises-security-concerns"><h5 itemProp="headline" class="font-heading">DOGE’s moves on government data raises security concerns</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-14T10:15:00.000-05:00">February 14, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>The advisory group's actions have resulted in its scrutiny over security clearances, cybersecurity practices, and the legality of its activities.</p> </div></div></div></div></article><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/trump-admin-sought-to-counter-uk-ordered-icloud-encryption-backdoor"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="(Credit: CDPiC &amp;#8211; stock.adobe.com)" loading="lazy" width="800" height="450" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 800 450&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRsQBAABXRUJQVlA4ILgBAACQCQCdASoyABwAPp1Amkolo6IhrBVcyLATiWUAzNbzddY03Obur5lh3tnxCD/628w0zmPrKMoynRTxNiWshCXj9L1ZKyuWOC5n9s/IssWB40WD+/OgAP6Zv7O+KlQNetiY+Qs2WtAvnW9lzy2gshNMdlaA5hZFr1OrHR/X3yQVLoRSlo6Hrihoo1TBFvDvMH1bax2MQ7UXyKs3w7krE1/cUuD45YuTOMome2WIfbqwuzug6DVC+fWrbhxE0CtXlFeHbSO3dnvClAXNsWDB8RRRogke8wJrcYfNoIB9e9Mab+wBWhJ4dgBL7pjy0l4d5D2pWrHvM6+JEaA3T2V24vgjVHN0JNONnZBL6t7YPHOinVYcgTghoBCra7j8Lyrj/HRiMrPCanJlZRh/gMvAOCY4J+o7GlKZnYWv0Wtdhb3N4y9MlfDTN/+48wfJAiM59s9bnGN37m/v01Sn9IxoRrKQtXxbpdku8aLMPewz51a4OSSsI5gaPuWSvi+sKo/3/hljBCSYIdaTdc74aAXjMMZjqCSOIN/U6J+IrFUPghMroT3i1MOxtv67ek+8PGc3RcOltj8cQAAAAA==&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/government-regulations">Government Regulations</a></div><a href="/brief/trump-admin-sought-to-counter-uk-ordered-icloud-encryption-backdoor"><h5 itemProp="headline" class="font-heading">Trump admin sought to counter UK-ordered iCloud encryption backdoor</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-14T09:55:00.000-05:00">February 14, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Newly appointed U.S. Director of National Intelligence Tulsi Gabbard has been urged by Sen. Ron Wyden, D-Ore., and Rep. Andy Biggs, R-Ariz., to oppose the UK's reported order for Apple to develop a backdoor that would enable government access to encrypted iCloud data, which they argued to be detrimental to U.S. government and citizen data security.</p> </div></div></div></div></article><div class="Placeholder_base__bMucx slot_wrapper__JFKwH slot_native__8EO55 LandingTeaser_spacing__TVfzN w-100 dfp-slot ad align-items-center"><div class=""><div class="mx-auto" id=":R4nrd8m:"></div></div></div><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/almost-12m-zacks-investment-research-accounts-exposed"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="(Adobe Stock)" loading="lazy" width="1200" height="800" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1200 800&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/data-security">Data Security</a></div><a href="/brief/almost-12m-zacks-investment-research-accounts-exposed"><h5 itemProp="headline" class="font-heading">Almost 12M Zacks Investment Research accounts exposed</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-14T09:21:00.000-05:00">February 14, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Infiltration of Zacks' active directory as domain admin enabled the theft of source code belonging to the company's primary website and 16 others, according to the threat actor, who has been peddling the exfiltrated account information, including full names, usernames, physical and email addresses, and phone numbers, for a small amount of cryptocurrency.</p> </div></div></div></div></article><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/unsecured-mars-hydro-database-exposes-2-7-billion-records"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="Digital Lock." loading="lazy" width="1280" height="800" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1280 800&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,UklGRigGAABXRUJQVlA4IBwGAAAQIACdASoyAB8APiUOhUIhhv0ABgCRLYATplCOaPHfxQ/Yz4BKH/IPuP+0/+UywTYD8gPar6gPtN9TDpAeYD+Of3T9d/fE/pPqA9AD9gOsA/YD2AP2S9Lj9wPga/Yf9rvaH/+F4p/LfAfvQeKPXjQA/i31u+8/0n9uOQHeD/w7+3flr5AGwp/K/8l/Wvxc5wPqJ6Dv5Z/j/Ir/s3iDd7ewB/Iv57/oPuq+kj9p/3X3SeyP8t/r3/F/wfwBfxn+j/6f+7/4f/z/Dt6xf2U9j39eiReJkJxQBulyHQBGQHwbZzNcHB/jMID3rhLNblRTk2NaDNSlYMvSv6DE0pYXzxrTSOE4HArrBPmgAP60t4BnozYGd4C8ZaJshj1lwbyiH++UGyoiR6uB5PtdVvCqFomzNizd3DXAuZMN6ZbVvLMfrI4sOf385z+Of0kXT9CpFABBNO3noKahWwyqBM0Z0jE2sokmNZO8oaTyCaqVqQX3DW/ddq1tKEWLw8DCrrE60ToieWi7KP/QY653jv/5J39oFMW3FhgoV1erLlGVqa//3aP/1Sq/+sCg9W/GEQVbksl+W112Qqpisk86r0YdywPLNGqqK5lxafWNdOfJ6y742MLz9Zq7Ve9Opo0rciQdDeqUoAC1Cz/AoIMGvM6oP1f5lWRuN9lFYp2sDwNWybLagbsW5tCatf29z4U6Zvu2s2s9I9T0ORvHqXeRrM3yFjWVutmif7NF+9zsjXNufqP/3B8vXUgSHofM2aaImbKDCUzJVBJz5Z+5VP2hEK1AKJ2V58GTEwWgz3++RkEOTjFbWMoFYSiv8NC4/Vf4AcMc4UVJ50rjoF4cJkku/DvyMZd4XfishHnSmjS87vbw6MN+MQBvGv58/LDtpeQCpBgSsFhxPYPXS8Sf4LclOxXkAMs/s0cYlfKoA5L+VmNxU2mjP9+JDGA8JNsrddcz27mBVd7ENiFeCyKtcCAAqEKp1kQlPEYLekJ3riWtFog/+PB8NaRNEDC0NTligvG4aKxAPfKlnYYuT83fHLI4JlcPmewPOitW7gw1m1Kr3MqRpsjRf8Y9w15vy7bnB3hGNzmdFc9l6TZJp3I+UUgvC5tjLRyh82aj9eRfZAii6Elmg+Fb6pPhMvy6K1YnJOywVob8X4ZVPKX8cMAVVMK1phGWLfaftK4DQJvN4VWhtchCQILN8AlJy5igVVbwJD0ykzRvPoepcTLKN/HjziUi8UmuytjKaEjN4rIYCbpChKWJwp0OjIO5J5i0eRB1q1dYyD3t8Un/s0wvZOURU6xoqUbm6AmKSkBih9tQf6Qi6hAPeou3ATvBm4rljx87BOqbJYB0EBpLfbRE+V1oPGUsKr+LNKqLiKeNPqLJX4r5r8NnV9e5v+37PXJCCODyhWfdpoS6ViVZ6NLI1K/j3PxpDwuDx8p8VPkiJeSiFBgd8KVliHzmBCWbT7zvHQyz2EozOBJs3MksSN1MNspfsj/NzyPziL7ry1nmAbYCcN/Y8rLjG3Ky4fecxkt5Uxmf64y9UD9Mh+ERP9Ek2J5qM6w2tjEp5Wk318YU41As28YG4FCeYFMAYLASEBotVB1bs/kM5Myny9Rk7TandK9eQW1t/2Xs31gEKTJ8gWFP2pi5m7GXOFUmXyXkn8TTfGZsXQRn20ayZ5fE2Lw2un7CzUFvW+pPwiqyw4L8U4yFn5l+23tiL/WO/ZuB+8qCoUeWP2R3mWM79UiE0nXJXIx6z17mjFIIP86lGLyUujuOvd/2GFjyCB1ptJIy3JYvmauLlqrR/qv1Q2UiOKWeAGY7ZB7e3i2/gWZdsH+mYE4tFq/AMeZvBBjyYTercC1AmDqaO2PpY27JH386lRIWn4Ncx9UgprVNygFLTj75jRmRH2YPZRCgtQ+breOeeEKr/j3i/VSGsbYTeGfjlKPSSw9CtXcYq7U81YMxwK+k8Rpg0KxqSovHbZvqS/BM1ZB1pri4w8Dhla7x6dNpN10BzJdh31T6+v+Eewb1EidJfya731MY+gCgqIGgLkRolhv2/KdjtdhH2NujEOUzf3Cl/cJ5WHyvoIDajn+g6905QDzHZygEAAAA&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/data-security">Data Security</a></div><a href="/brief/unsecured-mars-hydro-database-exposes-2-7-billion-records"><h5 itemProp="headline" class="font-heading">Unsecured Mars Hydro database exposes 2.7 billion records</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-13T10:09:00.000-05:00">February 13, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Such a database not only contained Wi-Fi network names and credentials, device IDs, IP addresses, and email addresses but also other sensitive logging, monitoring, and error records for IoT devices around the world, according to an investigation by cybersecurity researcher Jeremy Fowler published on vpnMentor.</p> </div></div></div></div></article><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/unimicron-purportedly-subjected-to-sarcoma-ransomware-attack"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="" loading="lazy" width="800" height="450" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 800 450&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/ransomware">Ransomware</a></div><a href="/brief/unimicron-purportedly-subjected-to-sarcoma-ransomware-attack"><h5 itemProp="headline" class="font-heading">Unimicron purportedly subjected to Sarcoma ransomware attack</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-13T09:59:00.000-05:00">February 13, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Despite confirming that its China-based subsidiary Unimicron Technology (Shenzhen) Corp., had been disrupted by a ransomware intrusion on Jan. 30, Unimicron did not disclose being subjected to a data breach as it noted an ongoing investigation into the incident.</p> </div></div></div></div></article><div class="Placeholder_base__bMucx slot_wrapper__JFKwH slot_native__8EO55 LandingTeaser_spacing__TVfzN w-100 dfp-slot ad align-items-center"><div class=""><div class="mx-auto" id=":R8nrd8m:"></div></div></div><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/immigration-themed-phishing-attack-uncovered"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="" loading="lazy" width="2560" height="1707" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 2560 1707&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/phishing">Phishing</a></div><a href="/brief/immigration-themed-phishing-attack-uncovered"><h5 itemProp="headline" class="font-heading">Immigration-themed phishing attack uncovered</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-13T09:56:00.000-05:00">February 13, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Attacks involved the delivery of malicious emails warning travelers of potential denied entry due to incomplete immigration requirements that include a link redirecting to a fake government portal-spoofing website facilitating login credential and payment data theft, a report from Cofense revealed.</p> </div></div></div></div></article><article itemScope="" itemProp="hasPart" itemType="https://schema.org/Article" class="LandingTeaser_spacing__TVfzN teaser teaser-list-item mx-auto typography-v2"><div class="LandingTeaser_container__5Wl3H d-flex flex-nowrap"><a itemScope="" itemProp="image" itemType="https://schema.org/ImageObject" class="image-link TeaserImage_hideEmpty__cfQuH TeaserImage_wrap__yhpMz" href="/brief/misconfiguration-exposes-millions-of-hipshipper-records"><div class="Overlay_overlayWrap__fxtmP"><img itemProp="url" alt="concept of leaky software, data with a tap sticking out.3d illustration" loading="lazy" width="1105" height="700" decoding="async" data-nimg="1" class="mh-100 MediaItem_img__QQ6NG" style="color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image/svg+xml;charset=utf-8,%3Csvg xmlns=&#x27;http://www.w3.org/2000/svg&#x27; viewBox=&#x27;0 0 1105 700&#x27;%3E%3Cfilter id=&#x27;b&#x27; color-interpolation-filters=&#x27;sRGB&#x27;%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3CfeColorMatrix values=&#x27;1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1&#x27; result=&#x27;s&#x27;/%3E%3CfeFlood x=&#x27;0&#x27; y=&#x27;0&#x27; width=&#x27;100%25&#x27; height=&#x27;100%25&#x27;/%3E%3CfeComposite operator=&#x27;out&#x27; in=&#x27;s&#x27;/%3E%3CfeComposite in2=&#x27;SourceGraphic&#x27;/%3E%3CfeGaussianBlur stdDeviation=&#x27;20&#x27;/%3E%3C/filter%3E%3Cimage width=&#x27;100%25&#x27; height=&#x27;100%25&#x27; x=&#x27;0&#x27; y=&#x27;0&#x27; preserveAspectRatio=&#x27;none&#x27; style=&#x27;filter: url(%23b);&#x27; href=&#x27;data:image/webp;base64,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&#x27;/%3E%3C/svg%3E&quot;)" sizes="(max-width: 768px) 47vw,(max-width: 992px) 28vw,384px" srcSet="https://image-optimizer.cyberriskalliance.com/unsafe/256x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 256w, https://image-optimizer.cyberriskalliance.com/unsafe/384x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 384w, https://image-optimizer.cyberriskalliance.com/unsafe/576x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 576w, https://image-optimizer.cyberriskalliance.com/unsafe/768x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 768w, https://image-optimizer.cyberriskalliance.com/unsafe/992x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 992w, https://image-optimizer.cyberriskalliance.com/unsafe/1200x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 1200w, https://image-optimizer.cyberriskalliance.com/unsafe/1400x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 1400w, https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg 1920w" src="https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg"/></div></a><div><div itemProp="articleSection" class="Tag_tag__uMu2r tmb-3 text-uppercase layout-title-small font-weight-bold text-muted Tag_muted__5TYb2"><a rel="tag" href="/topic/data-security">Data Security</a></div><a href="/brief/misconfiguration-exposes-millions-of-hipshipper-records"><h5 itemProp="headline" class="font-heading">Misconfiguration exposes millions of Hipshipper records</h5></a><p class="text-muted-50 tmb-3 text-small"><span itemScope="" itemType="https://schema.org/Person" itemProp="author" class="me-2"><a itemProp="url" rel="author" href="/contributor/sc-staff"><span itemProp="name"><span itemProp="givenName">SC<!-- --> </span><span itemProp="familyName">Staff</span></span></a></span><time class="non-interactive" dateTime="2025-02-12T11:28:00.000-05:00">February 12, 2025</time></p><div itemProp="abstract" class="text-break text-muted font-body-regular"><div><p>Most of the leaked information consisted of shipping labels and customs declaration forms containing individuals' full names, home addresses, and phone numbers, as well as their order details, according to Cybernews researchers, who noted that Hipshipper had protected the misconfigured storage bucket nearly a month after initial disclosure.</p> </div></div></div></div></article><div><div class="LoadMore_loadMoreWrapper__lWLYa container"><button type="button" disabled="" class="LoadMore_loadMoreButton__KKc12 btn active btn-outline-light btn-lg">Loading...</button></div></div></div></div></section></div><div class="Regions_contentColumn__zwode content-column col-md-3"><div class="Placeholder_base__bMucx Placeholder_box__TtFgt Placeholder_withDisclaimer__SC2O5 slot_wrapper__JFKwH mb-3 pb-0 d-flex flex-column my-auto dfp-slot ad align-items-center"><div class=""><p class="fs-11 shallow-fs-11 text-muted mb-0 text-center text-uppercase non-interactive"> </p><div class="mx-auto" id=":Rvd8m:"></div></div></div></div></div></div></div><div class="prestitial_wrapper__Ll0_Q d-none w-100 h-100 overflow-hidden top-0 left-0 position-fixed"><div class="prestitial vw-100 vh-100 prestitial-backdrop"><div class="prestitial-wrapper m-auto w-fit"><div class="text-center text-white position-relative pt-5 mx-0 fs-4"><p id="prestitial-timer-text" class="mb-0 p-2">You can skip this ad in <!-- -->5<!-- --> seconds</p></div><div id=":Rh8m:"></div></div></div></div><a rel="next" class="visually-hidden" href="/topic/data-security/2">next page</a></div></main><footer class="Footer_footerContainer__gOPdY pt-3 pb-5 font-tiltilium container-xxl"><hr class="Footer_topBorder__93LuI pt-5 pb-2 mx-auto"/><div class="justify-content-center row"><div class="col-lg-10"><div class="mb-1 row"><div class="col-lg-auto col-sm-12"><nav><div class="justify-content-center row"><div class="p-0 col-auto"><a title="SC Media" href="/"><svg xmlns="http://www.w3.org/2000/svg" viewBox="6.28 12.02 176.7 176.72" height="150" width="150"><circle cx="94.62" cy="99.37" r="82.33" style="fill:#ee1c25"></circle><path d="M105.67 116.39c3.73 3.82 8.61 5.68 14.65 5.68 7.1 0 13.23-3.37 16.16-8.79l10.57 6.13c-5.33 8.97-15.36 14.65-26.73 14.65-9.32 0-17.05-3.11-23.18-9.32-2.26-2.29-4.09-4.78-5.51-7.46-.44 4.85-2.52 8.74-6.21 11.72-4.17 3.38-9.59 5.06-16.25 5.06-12.34 0-20.96-5.86-24.42-15.36l10.48-6.13c2.4 6.3 7.19 9.5 14.3 9.5s9.95-2.75 9.95-6.57c0-2.22-.98-3.91-2.93-5.06-1.96-1.24-5.42-2.57-10.48-4-5.59-1.69-8.97-3.02-12.88-5.77-3.82-2.84-5.86-7.1-5.86-12.79s1.95-10.12 5.95-13.41c4-3.37 8.88-5.06 14.48-5.06 10.04 0 17.94 5.15 22.2 13.94l-10.3 5.95c-2.49-5.33-6.48-7.99-11.9-7.99-5.06 0-8.17 2.58-8.17 6.22 0 1.95.8 3.55 2.4 4.8 1.69 1.15 4.8 2.49 9.41 3.91l4.26 1.42c.98.27 2.31.8 4 1.51 1.69.62 3.02 1.24 3.91 1.87 1.35.83 3.2 2.23 4.56 3.74-.08-.99-.12-2-.12-3.03 0-9.15 3.02-16.87 9.15-23 6.13-6.22 13.85-9.32 23.18-9.32 11.28 0 21.4 5.68 26.73 14.65l-10.57 6.13c-3.11-5.59-9.06-8.88-16.16-8.88-6.04 0-10.92 1.86-14.65 5.68-3.64 3.82-5.51 8.7-5.51 14.74s1.87 10.83 5.51 14.65Z" style="fill:#fff"></path></svg></a></div></div><div class="justify-content-center social-icons row"><div class="col-auto"><a title="SCMagazine on Facebook" class="d-flex p-0" target="_blank" href="https://www.facebook.com/SCMag/"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" stroke="currentColor" viewBox="0 0 24 24" class="icon-primary facebook"><path fill="none" stroke-linecap="round" stroke-linejoin="round" stroke-width="1.5" d="M17 2h-3a5 5 0 0 0-5 5v3H6v4h3v8h4v-8h3l1-4h-4V7a1 1 0 0 1 1-1h3V2Z"></path></svg></a></div><div class="col-auto"><a title="SCMagazine on Twitter" class="d-flex p-0" target="_blank" href="https://twitter.com/scmagazine"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="-2 -2 24 24" class="icon-primary twitter"><path fill="currentColor" stroke="currentColor" stroke-width="0.625" d="m11.617 8.66 6.33-7.41h-1.5l-5.494 6.434-4.39-6.434H1.5l6.637 9.73L1.5 18.75H3l5.803-6.795 4.636 6.795H18.5L11.617 8.66Zm-2.053 2.405-.673-.969L3.54 2.388h2.304l4.317 6.22.673.97 5.614 8.087h-2.304l-4.58-6.6Z"></path></svg></a></div><div class="col-auto"><a title="SCMagazine on LinkedIn" class="d-flex p-0" target="_blank" href="https://www.linkedin.com/company/scmediaus/"><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" class="icon-primary linkedin"><path fill="currentColor" d="M19.868 2.625H4.132c-.832 0-1.507.675-1.507 1.507v15.736c0 .832.675 1.507 1.507 1.507h15.736c.832 0 1.507-.675 1.507-1.507V4.132c0-.832-.675-1.507-1.507-1.507Zm0 17.25c-10.495-.002-15.743-.005-15.743-.007.002-10.495.005-15.743.007-15.743 10.495.002 15.743.005 15.743.007a13277.3 13277.3 0 0 1-.007 15.743ZM5.405 9.654h2.782v8.948H5.405V9.654ZM6.797 8.43a1.614 1.614 0 0 0 .617-3.102 1.613 1.613 0 1 0-.617 3.102Zm5.913 5.745c0-1.167.223-2.297 1.669-2.297 1.425 0 1.446 1.334 1.446 2.372v4.352h2.78v-4.908c0-2.409-.52-4.263-3.335-4.263-1.353 0-2.26.743-2.633 1.446H12.6V9.654H9.93v8.948h2.78v-4.427Z"></path></svg></a></div></div></nav></div><div class="offset-lg-1 col"><nav class="pb-0 pt-2 navbar navbar-expand navbar-light"><div class="container-xxl"><div class="nav-fill d-flex flex-lg-row flex-column justify-content-center w-100 fs-9 navbar-nav"><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC text-uppercase d-block py-0 py-lg-2 px-3 non-interactive fs-5 footer-section-title">About Us</h5><a class="FooterMenu_link__4UH_H footer-nav-element" href="/about-us">SC Media</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://www.cyberriskalliance.com/">CyberRisk Alliance</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/contact-us">Contact Us</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://www.cyberriskalliance.com/careers/">Careers</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy</a></div><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC text-uppercase d-block py-0 py-lg-2 px-3 non-interactive fs-5 footer-section-title">Get Involved</h5><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://pages.cyberriskalliance.com/SC_NL_OptIn-LP.html">Subscribe</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/contribute">Contribute/Speak</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/virtual-conferences">Attend an event</a><a class="FooterMenu_link__4UH_H footer-nav-element" target="_blank" href="https://cybersecuritycollaboration.com/">Join a peer group</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/become-a-sponsor">Partner With Us</a></div><div class="FooterMenu_navItem___hhKf mt-lg-0 font-heading nav-item"><h5 class="FooterMenu_sectionTitle__Tn0gC text-uppercase d-block py-0 py-lg-2 px-3 non-interactive fs-5 footer-section-title">Explore</h5><a class="FooterMenu_link__4UH_H footer-nav-element" href="/sw-labs">Product reviews</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/cra-business-intelligence">Research</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/resource-library">White papers</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/webcasts">Webcasts</a><a class="FooterMenu_link__4UH_H footer-nav-element" href="/security-weekly">Podcasts</a></div></div></div></nav></div></div><div class="justify-content-center fs-10 row"><div class="col"><div class="non-interactive text-center text-lg-start"><p class="m-0"> Copyright © 2025 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. </p><p class="m-0"><span>Your use of this website constitutes acceptance of CyberRisk Alliance </span><a class="text-underline cursor-pointer" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a><span> and </span><a class="text-underline cursor-pointer" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use">Terms of Use</a><span>.</span></p></div></div></div></div></div></footer></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"pageSlug":"data-security","taxonomy":{"__typename":"Topic","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security","databaseId":74600,"name":"Data Security","description":null},"nativeConfiguration":{"nativeAdFrequency":4,"options":["nativeAds"]},"year":null,"teasers":[{"__typename":"Editorial","id":"cG9zdDo3OTkwOTg=","databaseId":799098,"uri":"/brief/key-distributors-of-encrypted-communication-service-sky-ecc-arrested","title":"Key distributors of encrypted communication service Sky ECC arrested","date":"2025-02-14T10:22:48","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwNA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYyMA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYxOQ==","children":{"nodes":[{"id":"dGVybTo3NDY1Mw=="},{"id":"dGVybTo3NDY1NA=="},{"id":"dGVybTo3NDYyMQ=="},{"id":"dGVybTo3NDYyMg=="},{"id":"dGVybTo3NDYyMA=="},{"id":"dGVybTo3NDY1NQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eSpanish police identified two of the suspects as the service’s top global distributors, having earned over $14 million from subscription sales.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2020/04/Arrest-Indictment-Cybercrime-Infosec-2-scaled.jpg","altText":"Nigerian Nationals Arrested","caption":null,"title":"Arrest-Indictment-Cybercrime-Infosec","mediaDetails":{"width":2560,"height":1791},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/encryption","name":"Encryption","slug":"encryption","id":"dGVybTo3NDYwNA==","uri":"/topic/encryption"},{"__typename":"Topic","link":"https://www.scworld.com/topic/threat-intelligence","name":"Threat Intelligence","slug":"threat-intelligence","id":"dGVybTo3NDYyMA==","uri":"/topic/threat-intelligence"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3OTkwODU=","databaseId":799085,"uri":"/brief/doges-moves-on-government-data-raises-security-concerns","title":"DOGE’s moves on government data raises security concerns","date":"2025-02-14T10:15:06","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eThe advisory group's actions have resulted in its scrutiny over security clearances, cybersecurity practices, and the legality of its activities.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2023/09/0915_elon_musk.jpg","altText":"Elon Musk","caption":"\u003cp\u003eTesla CEO Elon Musk arrives outside the Russel Senate Office Building on Capitol Hill on Sept. 13, 2023. (Photo by Tom Brenner for The Washington Post via Getty Images)\u003c/p\u003e\n","title":"Elon Musk","mediaDetails":{"width":1600,"height":900},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":"(Photo by Tom Brenner for The Washington Post via Getty Images)"},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/government-regulations","name":"Government Regulations","slug":"government-regulations","id":"dGVybTo3NDU5Mg==","uri":"/topic/government-regulations"},{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3OTkwNjY=","databaseId":799066,"uri":"/brief/trump-admin-sought-to-counter-uk-ordered-icloud-encryption-backdoor","title":"Trump admin sought to counter UK-ordered iCloud encryption backdoor","date":"2025-02-14T09:55:48","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5MA==","children":{"nodes":[{"id":"dGVybTo3NDYzMw=="},{"id":"dGVybTo3NDU5MQ=="},{"id":"dGVybTo3NDYzNA=="},{"id":"dGVybTo3NDU5Mg=="},{"id":"dGVybTo3NDU5Mw=="},{"id":"dGVybTo3NDU5OA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Mg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU5Ng==","children":{"nodes":[{"id":"dGVybTo3NDY0Nw=="},{"id":"dGVybTo3NDY0OA=="},{"id":"dGVybTo3NDYwNQ=="},{"id":"dGVybTo3NDU5Nw=="},{"id":"dGVybTo3NDY0OQ=="},{"id":"dGVybTo3NDY0Ng=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU5Nw==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU4Mw==","children":{"nodes":[{"id":"dGVybTo3NDU5NA=="},{"id":"dGVybTo3NDU5MA=="},{"id":"dGVybTo3NDU4NA=="},{"id":"dGVybTo3NDYwOA=="},{"id":"dGVybTo3NDYwNw=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eNewly appointed U.S. Director of National Intelligence Tulsi Gabbard has been urged by Sen. Ron Wyden, D-Ore., and Rep. Andy Biggs, R-Ariz., to oppose the UK's reported order for Apple to develop a backdoor that would enable government access to encrypted iCloud data, which they argued to be detrimental to U.S. government and citizen data security.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/03/AdobeStock_299187090_Editorial_Use_Only.jpg","altText":"","caption":"\u003cp\u003e(Credit: CDPiC \u0026#8211; stock.adobe.com)\u003c/p\u003e\n","title":"icloud_AdobeStock_299187090_Editorial_Use_Only","mediaDetails":{"width":800,"height":450},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/government-regulations","name":"Government Regulations","slug":"government-regulations","id":"dGVybTo3NDU5Mg==","uri":"/topic/government-regulations"},{"__typename":"Topic","link":"https://www.scworld.com/topic/privacy","name":"Privacy","slug":"privacy","id":"dGVybTo3NDU5Nw==","uri":"/topic/privacy"},{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"}]},"sponsor":{"sponsors":[]}},{"__typename":"CerberusDfpNativeAd","id":"1f944072f7587e530e8006bbe9c71ccc7721d262","databaseId":56582248},{"__typename":"Editorial","id":"cG9zdDo3OTkwNTM=","databaseId":799053,"uri":"/brief/almost-12m-zacks-investment-research-accounts-exposed","title":"Almost 12M Zacks Investment Research accounts exposed","date":"2025-02-14T09:21:41","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eInfiltration of Zacks' active directory as domain admin enabled the theft of source code belonging to the company's primary website and 16 others, according to the threat actor, who has been peddling the exfiltrated account information, including full names, usernames, physical and email addresses, and phone numbers, for a small amount of cryptocurrency.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/09/093024_data_breach.jpg","altText":"","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"","mediaDetails":{"width":1200,"height":800},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scworld.com/topic/breach","name":"Breach","slug":"breach","id":"dGVybTo3NDYwMg==","uri":"/topic/breach"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3OTg4MDc=","databaseId":798807,"uri":"/brief/unsecured-mars-hydro-database-exposes-2-7-billion-records","title":"Unsecured Mars Hydro database exposes 2.7 billion records","date":"2025-02-13T10:09:08","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYyNA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Nw==","children":{"nodes":[{"id":"dGVybTo3NDYyMw=="},{"id":"dGVybTo3NDYyNA=="},{"id":"dGVybTo3NDYwMw=="},{"id":"dGVybTo3NDU3OA=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eSuch a database not only contained Wi-Fi network names and credentials, device IDs, IP addresses, and email addresses but also other sensitive logging, monitoring, and error records for IoT devices around the world, according to an investigation by cybersecurity researcher Jeremy Fowler published on vpnMentor.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2023/04/0426_cyberattack.jpg","altText":"Digital Lock.","caption":"\u003cp\u003eCredit: Getty Images\u003c/p\u003e\n","title":"Encryption your data. Digital Lock. Hacker attack and data breach. Big data with encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration","mediaDetails":{"width":1280,"height":800},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scworld.com/topic/patchconfiguration-management","name":"Patch/Configuration Management","slug":"patchconfiguration-management","id":"dGVybTo3NDYyNA==","uri":"/topic/patchconfiguration-management"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3OTg3OTk=","databaseId":798799,"uri":"/brief/unimicron-purportedly-subjected-to-sarcoma-ransomware-attack","title":"Unimicron purportedly subjected to Sarcoma ransomware attack","date":"2025-02-13T09:59:51","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMg==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eDespite confirming that its China-based subsidiary Unimicron Technology (Shenzhen) Corp., had been disrupted by a ransomware intrusion on Jan. 30, Unimicron did not disclose being subjected to a data breach as it noted an ongoing investigation into the incident.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg","altText":"","caption":null,"title":"ransomware_AdobeStock_214626853","mediaDetails":{"width":800,"height":450},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/ransomware","name":"Ransomware","slug":"ransomware","id":"dGVybTo3NDYwMQ==","uri":"/topic/ransomware"},{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scworld.com/topic/breach","name":"Breach","slug":"breach","id":"dGVybTo3NDYwMg==","uri":"/topic/breach"}]},"sponsor":{"sponsors":[]}},{"__typename":"CerberusDfpNativeAd","id":"5945ab28f8f5deaad89773b105c51fa004613126","databaseId":60003106},{"__typename":"Editorial","id":"cG9zdDo3OTg3OTM=","databaseId":798793,"uri":"/brief/immigration-themed-phishing-attack-uncovered","title":"Immigration-themed phishing attack uncovered","date":"2025-02-13T09:56:52","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYxMA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYwMQ==","children":{"nodes":[{"id":"dGVybTo3NDYwMg=="},{"id":"dGVybTo3NDYyNg=="},{"id":"dGVybTo3NDYxMA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYyMA==","children":{"nodes":[]}},{"__typename":"Topic","id":"dGVybTo3NDYxOQ==","children":{"nodes":[{"id":"dGVybTo3NDY1Mw=="},{"id":"dGVybTo3NDY1NA=="},{"id":"dGVybTo3NDYyMQ=="},{"id":"dGVybTo3NDYyMg=="},{"id":"dGVybTo3NDYyMA=="},{"id":"dGVybTo3NDY1NQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eAttacks involved the delivery of malicious emails warning travelers of potential denied entry due to incomplete immigration requirements that include a link redirecting to a fake government portal-spoofing website facilitating login credential and payment data theft, a report from Cofense revealed.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/07/AdobeStock_65690062-scaled.jpeg","altText":"","caption":null,"title":"unsecured http connection – phishing website concept","mediaDetails":{"width":2560,"height":1707},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/phishing","name":"Phishing","slug":"phishing","id":"dGVybTo3NDYxMA==","uri":"/topic/phishing"},{"__typename":"Topic","link":"https://www.scworld.com/topic/threat-intelligence","name":"Threat Intelligence","slug":"threat-intelligence","id":"dGVybTo3NDYyMA==","uri":"/topic/threat-intelligence"},{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"}]},"sponsor":{"sponsors":[]}},{"__typename":"Editorial","id":"cG9zdDo3OTg1Mjk=","databaseId":798529,"uri":"/brief/misconfiguration-exposes-millions-of-hipshipper-records","title":"Misconfiguration exposes millions of Hipshipper records","date":"2025-02-12T11:28:31","topics":{"nodes":[{"__typename":"Topic","id":"dGVybTo3NDU3OQ==","children":{"nodes":[{"id":"dGVybTo3NDY0MA=="},{"id":"dGVybTo3NTM1Ng=="},{"id":"dGVybTo3NDY0Mg=="},{"id":"dGVybTo3NTM1Nw=="},{"id":"dGVybTo3NDY0NA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDYwMA==","children":{"nodes":[{"id":"dGVybTo3NDYwNA=="}]}},{"__typename":"Topic","id":"dGVybTo3NDU3Mw==","children":{"nodes":[{"id":"dGVybTo3NDYxMQ=="},{"id":"dGVybTo3NDU3NQ=="},{"id":"dGVybTo3NDU5OQ=="},{"id":"dGVybTo3NTA5NQ=="},{"id":"dGVybTo3NDU3OQ=="},{"id":"dGVybTo3NDYwMA=="},{"id":"dGVybTo3NDU5Ng=="},{"id":"dGVybTo3NDYxMg=="},{"id":"dGVybTo3NDU4Mg=="},{"id":"dGVybTo3NDYwMQ=="}]}}]},"authorCollection":{"author":[{"title":"SC Staff","uri":"/contributor/sc-staff","slug":"sc-staff","peopleAdvanced":{"firstName":"SC","middleName":null,"lastName":"Staff"}}]},"editorialAdvanced":{"deck":"\u003cp\u003eMost of the leaked information consisted of shipping labels and customs declaration forms containing individuals' full names, home addresses, and phone numbers, as well as their order details, according to Cybernews researchers, who noted that Hipshipper had protected the misconfigured storage bucket nearly a month after initial disclosure.\u003c/p\u003e\n","featuredImage":{"sourceUrl":"https://files.cyberriskalliance.com/wp-content/uploads/2024/02/020624_data_leak.jpg","altText":"concept of leaky software, data with a tap sticking out.3d illustration","caption":"\u003cp\u003e(Adobe Stock)\u003c/p\u003e\n","title":"concept of leaky software, data with a tap sticking out","mediaDetails":{"width":1105,"height":700},"mediaAdvanced":{"lqip":"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"}},"featuredImageCaption":null},"editorialTaxonomy":{"type":{"name":"Brief"},"podcastShow":null,"topic":[{"__typename":"Topic","link":"https://www.scworld.com/topic/data-security","name":"Data Security","slug":"data-security","id":"dGVybTo3NDYwMA==","uri":"/topic/data-security"},{"__typename":"Topic","link":"https://www.scworld.com/topic/cloud-security","name":"Cloud Security","slug":"cloud-security","id":"dGVybTo3NDU3OQ==","uri":"/topic/cloud-security"}]},"sponsor":{"sponsors":[]}}],"page":1,"hasNextPage":true,"leftSidebar":{"learning":{"collection":[{"post":{"__typename":"Learning","id":"cG9zdDo3MTY1NDU=","title":"Improving Your Organization’s Data Security Posture","uri":"/cybercast/improving-your-organizations-data-security-posture","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Thursday, May 23, 2024 | 02:00 PM America/New_York","endDate":"Thursday, May 23, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}},{"post":{"__typename":"Learning","id":"cG9zdDo3Mjg3NzI=","title":"How to Deploy Cyber Applications on Your Security Data Lake","uri":"/cybercast/how-to-deploy-cyber-applications-on-your-security-data-lake","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Wednesday, July 17, 2024 | 02:00 PM America/New_York","endDate":"Wednesday, July 17, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}},{"post":{"__typename":"Learning","id":"cG9zdDo3NDQxNDg=","title":"Beyond the Buzzwords: Choosing Essential Tools for Your Security Stack","uri":"/cybercast/beyond-the-buzzwords-choosing-essential-tools-for-your-security-stack","learningAdvanced":{"vendor":[{"__typename":"Learning_Learningadvanced_Vendor_Intrado"}],"date":[{"startDate":"Thursday, October 3, 2024 | 02:00 PM America/New_York","endDate":"Thursday, October 3, 2024 | 03:00 PM America/New_York"}]},"learningTypes":{"nodes":[{"name":"Cybercast"}]}}}]},"video":null},"meta":{"authors":[],"authorNames":[],"breadcrumb":[{"name":"SC Media","position":0,"item":"https://www.scworld.com/"},{"name":"Topics","position":1,"item":"https://www.scworld.com/topics"},{"name":"Data Security","position":2,"item":"https://www.scworld.com/topic/data-security"}],"category":"data-security","databaseId":74600,"description":"Articles on Data Security","images":null,"created":null,"modified":null,"openGraphType":"website","sponsor":null,"subtypeSlug":null,"contentType":"topic","taxonomy":{"topic":["data-security"],"category":["data-security"],"brand":["sc-media"]},"title":"Data Security","uri":"/topic/data-security","jsonLdImages":[],"url":"https://www.scworld.com/topic/data-security","openGraph":{"url":"https://www.scworld.com/topic/data-security","title":"Data Security","description":"Articles on Data Security","locale":"en_US","type":"website","article":{"publishedTime":"","modifiedTime":"","authors":[],"tags":["data-security"]},"images":[{"url":"https://www.scworld.com/images/fallback-image.png"}]}},"yearsWithPosts":[2025,2024,2023,2022,2021,2020,2019,2018,2017,2016,2015,2014,2013,2012,2011,2010,2009,2008,2007]},"__N_SSG":true},"page":"/topic/[slug]/[page]","query":{"slug":"data-security","page":"1"},"buildId":"OIcz40-rMM-pRHqABsv_n","isFallback":false,"isExperimentalCompile":false,"dynamicIds":[99660,66180,80456],"gsp":true,"scriptLoader":[]}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10