Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

450k 1st Source Bank Customers Lost Personal Data in a Breach

1st Source Bank is a major financial institution located in Indiana and Michigan. The bank is headquartered in South Bend, Indiana, but there are 81 branches in the two states. Between these branches, there is a large number of employees and hundreds of thousands of customers. Many of those customers lost their personal data thanks to a recent breach.

Weekly Cybersecurity Recap July 28

Near the end of July, the MOVEit data breaches that occurred back in May are still doing serious damage and hurting major companies. Three of the five breaches reported this week were due to MOVEit-related attacks, including Milliman Solutions, the National Student Clearinghouse, and 1st Source Bank. The other two companies that suffered from major data breaches this week are Microsoft and the Tramp General Hospital.

Smarter Approaches to Software Validation in Life Sciences

Global regulations regarding software validation (e.g., 21 CFR Part 11, Annex 11, etc.) have been in place for many years. With an increasing number of software-as-a-service vendors offering GxP-compliant solutions, it is more important than ever that CSV and QA teams of all sizes make use of sensible approaches to software validation to better manage their overhead while maintaining compliance with regulatory requirements.

How to Quantify the ROI of your GRC & Security Programs

GRC programs are often viewed as cost centers. But, they can in fact be profit drivers by contributing to sales acceleration, cost and time savings, and risk reduction. The real question is, how can you prove that to the board? TrustCloud teamed up with ISSA to discuss.

Cybercrime and Delicate Situations: Managing Expectations and Emotions in High-End Agreements

Join us in this eye-opening video that explores the intersection of cybercrime and delicate situations when managing high-end agreements. Discover the challenges of handling emotionally invested individuals who may have false expectations, and learn how to navigate these situations with tact and courtesy. Our insights will help you mitigate potential risks while fostering positive interactions in the ever-evolving world of cybercrime.

CEO Fraud Scams and How to Deal With Them at the Email Gateway

Email scams known as "CEO Fraud" are very common right now. They are a type of "Business Email Compromise" (BEC). There have been numerous recent cases reported in the media, and we too, are seeing many reports by our customers. One customer described these attacks as 'rampant'. The US FBI recently put the estimate of losses in 2015 associated with BEC frauds in the hundreds of millions of dollars.

Comprehensive visibility is the foundation for effective threat detection and response

Businesses today are more dependent than ever on technology, making strong threat detection and response strategies essential. Cybercriminals in the modern world are constantly looking for new and creative ways to hack into organizational networks and steal sensitive data. Comprehensive visibility is a crucial element that is sometimes paid less attention to yet is the foundation of efficient threat detection and reaction.

E-commerce Fraud: A Digital Dilemma

The digital revolution, while bringing about unprecedented convenience and opportunities, has also opened the floodgates to a new wave of threats. E-commerce fraud and account takeover fraud are two such threats that have become increasingly prevalent in recent years. In the face of these challenges, fraud detection software has emerged as a critical tool in the fight against online fraud. This article will explore the role of fraud detection software in combating e-commerce fraud and account takeover fraud.

The Five Pillars of Cloud Security

As more employees move to remote work, more of today’s business environment is shifting towards the cloud. Indeed, approximately 90% of companies use at least one cloud-based service. While it brings great benefits, the cloud also brings challenges, including properly securing cloud-based assets. Cybercriminals are well-versed in corporate cloud usage and are successfully exploiting that knowledge. In the past year and a half, nearly 80% of companies suffered a cloud-based data breach.