your market intelligence analyst
Search Results
1,708 results
Your search is now limited to «Data and Network Breaches» expert search.
Business Insider 10/21/2019 16:52
WeWork CEOs tell staff layoffs are coming in leaked email ahead of critical meeting.
More from Business Insider:
SiliconANGLE 10/21/2019 15:59
According to NordVPN, last year’s breach saw a hacker compromise one of the rented servers it used for this purpose.
More from SiliconANGLE:
Health Data Management 10/21/2019 15:45
This year alone brought major data breaches to organizations as disparate as Capital One, Quest Diagnostics, DoorDash, Fortnite and the City of Baltimore.
More from Health Data Management:
HealthITSecurity 10/21/2019 13:00
October 21, 2019 - Researchers from WizCase recently discovered nine separate, unsecured medical websites leaking sensitive data from millions of patients around the world, including health information, Social Security numbers, and other sensitive data.
More from HealthITSecurity:
Digital Journal 10/21/2019 12:02
Commenting on the data breach to Digital Journal, Stephan Chenette , Co-Founder and CTO, AttackIQ states what the implications of the data breach are: “Unfortunately, it does not take much for cybercriminals to find databases left open to the public ...
More from Digital Journal:
HIPAA Journal 10/21/2019 10:50
Those four breaches accounted for 85.80% of the healthcare records breached in September.
More from HIPAA Journal:
Silicon Republic 10/21/2019 10:40
The post Avast antivirus network hacked in ‘cyberespionage attempt’ appeared first on Silicon Republic.
More from Silicon Republic:
Guardian (United Kingdom) 10/21/2019 10:04
The MPS admitted liability for claims concerning breaches of the Data Protection Act and Human Rights Act.
More from Guardian (United Kingdom): 10/21/2019 08:44
Following an investigation, the antivirus maker determined that the attacker was able to gain access using compromised credentials via a temporary VPN account.
More from
Graham Cluley - Blog 10/21/2019 08:42
Avast fends off hacker who breached its internal network in copycat CCleaner attack.
More from Graham Cluley - Blog:
Hospitality Technology 10/21/2019 08:00
Volume and sophistication of attacks, and complexity of the cybersecurity technology stack are top pain points.
More from Hospitality Technology:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications