Latest Posts › Data Security

Share:

UPDATE: Organizations Using the Salesloft Drift AI Chat Agent Must Check It for Compromise

On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more

Salesforce Users: Organizations Using the Salesloft Drift AI Chat Agent with Salesforce Must Check Their Presence for Compromise

Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more

Compliance Deadlines to Implement Significant Amendments to Regulation S-P Are Fast Approaching: Key Implications for Covered...

On May 16, 2024, the Securities and Exchange Commission (SEC) adopted sweeping amendments to Regulation S-P, which governs the privacy of nonpublic consumer personal and financial information for a broad range of financial...more

Active and Critical Security Concern for SharePoint

On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more

FTC Amends Safeguard Rule

On October 27, 2023, the Federal Trade Commission (FTC) further tightened requirements to safeguard customers’ financial information in the hands of financial institutions, with their release of a new amendment (Amendment) to...more

The Flaw in Log4j and How It Can Impact Your Business [Video]

A major vulnerability (known as Log4j or Logshell) within Java-based applications is impacting millions of applications around the world. This issue affects most industries and is very dangerous if applications are not...more

How to Protect your Organization From a Cybersecurity Attack [Video]

In this first session in our Cybersecurity Awareness Series, discover how to implement the “ounce of prevention, pound of cure” approach–specifically, what your organization can do to create a cybersecurity plan and...more

Phishing: Cybersecurity’s Biggest Threat [Video]

Not every cybersecurity threat is ransomware. Phishing is cybersecurity’s biggest threat. It’s one of the most common ways hackers can “get into” your organization, and it can result in much more than identity theft. In the...more

How to Prepare for a Cybersecurity Breach [Video]

In the second session in our Cybersecurity Awareness Series, learn the ins and outs of preparing your organization’s staff for a potentially damaging situation–whether created by accident or by a malicious outsider–by running...more

FTC Publishes Blog Outlining Corporate Board Guidance For Data Security

Yesterday, the Federal Trade Commission (FTC) published data security guidance on their business blog that should be taken seriously by any corporate board. The article, “Corporate Boards: Don’t Underestimate Your Role in...more

Rising Supply Chain Risk Requires Proactive Management

As the roughly 18,000 organizations, government agencies and educational institutions continue to recover from last year’s SolarWinds nation-state attack, one of the biggest takeaways from this event is that organizations...more

Petco Cyberattack Serves as Useful Reminder of Best Practices for Preventing Data Breach

A putative consumer class action filed in California state court on Friday the 18th against Petco Animal Supplies Stores Inc. (Petco) and its wholly owned subsidiary PupBox Inc. (PupBox) alleges that between February and...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide