• Thu. Apr 30th, 2026

Christina Antonelli

Connecting the World, Technology in Time

Breaches

  • Home
  • Cloud security: How to detect breaches and stop them quickly

Cloud security: How to detect breaches and stop them quickly

Cloud security is a priority for most firms, but breaches aren’t always identified before they have caused substantial damage. In some cases, cloud breaches are going undetected for hours or…

Cybersecurity Leadership in Crisis? CISO Resignations Spike After Major Breaches

The cybersecurity landscape is witnessing an alarming trend, Chief Information Security Officers (CISOs) are leaving their positions at unprecedented rates. Nearly half of CISOs globally are expected to change jobs…

Marriott required to pay $52 million, beef up information security in wake of data breaches

The Federal Trade Commission (FTC) will require Marriott International and its subsidiary Starwood Hotels & Resorts Worldwide to strengthen their information security in order to resolve charges that poor past…

Marriott agrees to pay $52 million, beef up data security to resolve probes over data breaches

Marriott International has agreed to pay $52 million and make changes to bolster its data security to resolve state and federal claims related to major data breaches that affected more…

When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

We need to do more than deflect cyberattacks: we need to build the capacity to sustain business … operations during and after a cyberattack. getty At the TED Conference in…

Healthcare Breaches and New Guidance

Despite being subjected to high regulatory expectations and intense scrutiny over information security practices, the healthcare industry has again succumbed to a significant data breach. Even before the recent cyberattack…