Weekly Cloud Security Roundup: Starwood Data Breach Lawsuits Begin, Cybersecurity Predictions, and More
Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019 cybersecurity predictions, and more.
First Lawsuits Filed in Starwood Hotels’ Breach
Legal fallout has begun from the massive Starwood Hotels reservation breach reported last week, with class-action suits filed on behalf of guests and investors. Here’s what to expect.
60 Cybersecurity Predictions For 2019
Will 2019 be the year of protected privacy? According to Chris Babel, CEO of TrustArc, “Managing privacy will be the new normal, like securing data or paying taxes. Privacy will continue on a similar path as the evolution of cybersecurity. The number of breaches and privacy-related incidents will continue to rise, up and to the right. … Like with security, a standard of constant privacy will become the new normal.”
See this and 59 other cybersecurity predictions for 2019 from experts in all industries on Forbes.
Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects
As attacks become more sophisticated and business leaders continue to champion digital transformation, an organization’s success depends on a well-equipped security team. These trends have driven a shift in the skills and abilities that CISOs and other executives seek when hiring security talent.
So what skills are today’s CISOs looking for in a security architect?
7 Warning Signs of an Insider Threat
According to a CA report, over 50 percent of organizations suffered an insider threat-based attack in the previous 12 months, while one-quarter say they are suffering attacks more frequently than in the previous year. And according to Ponemon, a successful, malicious insider attack can cost companies an average of $600,000.
Here, CSO Online outlines the seven warning signs of an insider threat that all security-minded professionals must keep an eye on.
Shadow IT is Alive and Well: One-Third of Employees Deploy Their Own Software
According to SailPoint’s 2018 Market Pulse Survey, employees see IT as an “inconvenience,” and often search for ways to get around security measures. As a result, Shadow IT has exploded, with 31 percent — 11 percent more than four years ago – say they or one of their colleagues have purchased and/or deployed software without IT’s help. But IT can’t make the organization secure if the user is working in the exact opposite direction.
Are your users’ attitudes toward IT putting the organization at risk of a cyber attack?
The Value of Having A Dedicated Salesforce Integration User
AppExchange vendors are thoroughly vetted, which means you can trust these partners to enhance your Salesforce investment without compromising your security. Nonetheless, connecting external tools to your Salesforce instance can present a challenge to Salesforce Admins: How do you ensure all your integrations are stable, auditable, and secure?
A dedicated integration user can be a great way to address this challenge, helping you manage integrations more seamlessly while increasing your productivity and saving you time. Here’s how.
Closing the Awareness Gap to Create a Security-Positive Culture
Security professionals, now more than ever, understand that individuals play a huge role in protecting the organization’s information at large. With more and more initiatives focused on the “human factor” or “human firewall,” it’s important to remember that end users can be leveraged as a protective measure, rather than a liability or vulnerability.
Here, you’ll find several best practices from leading organizations, government researchers, and academics, which can be applied to help you develop a more security-positive culture.