[“1/2+1/2″ fullwidth=”true” extra_class=”tree”][=”1/2″][“style11” height=”4″/]

The 12 Breaches of 2015

‘Tis The Season For Data Loss

This year hackers targeted organizations in healthcare, financial, education, government, and even the security industry itself. Take a look back at the biggest breaches of ’15 and cross your fingers for a better year to come.

[=”1/2″][“style11″ height=”21″/][blox_video type=”url” url=”https://youtu.be/efULzK9O2X8″ extra_class=”twelvedays”][“true” color=”#000000″ extra_class=”short”][“style11″ height=”2″/][blox_raw animation=”none”]<div class=”hermes”><a href=”http://ziften.com/?p=4747″><div class=”tp-tab”><span class=”tp-tab-image twelve”></span><span class=”numero”>12</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Trump Hotels</span><span class=”tp-tab-date”>Point-of-Sale vulnerabilities continue to plague retail and hospitality establishments, such as Trump Hotels.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4693″><div class=”tp-tab”><span class=”tp-tab-image two”></span><span class=”numero”>11</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Hacking Team</span><span class=”tp-tab-date”>Real-time vulnerability monitoring is crucial to any organization, but especially if your name is Hacking Team.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4695″><div class=”tp-tab”><span class=”tp-tab-image three”></span><span class=”numero”>10</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>LastPass</span><span class=”tp-tab-date”>One of the most important lessons from the LastPass breach: When authentication fails, user behavior analytics become increasingly necessary.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/ashley-madison-life-is-short-have-better-endpoint-security”><div class=”tp-tab”><span class=”tp-tab-image four”></span><span class=”numero”>9</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Ashley Madison</span><span class=”tp-tab-date”>Endpoint security blind spots compromised the privacy of 32 million Ashley Madison users.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4702″><div class=”tp-tab”><span class=”tp-tab-image eight”></span><span class=”numero”>8</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>OPM</span><span class=”tp-tab-date”>The OPM Breach hits home for Ziften VP of Product, who had his personal and biometric data compromised this year.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4726″><div class=”tp-tab”><span class=”tp-tab-image five”></span><span class=”numero”>7</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Adult Friend Finder</span><span class=”tp-tab-date”>Why finding a friend in endpoint security could have protected Adult Friend Finder against hackers.</span></span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4739″><div class=”tp-tab”><span class=”tp-tab-image six”></span><span class=”numero”>6</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Experian & T-Mobile</span><span class=”tp-tab-date”>Another day, another data breach: But what are we learning? Experian could learn from past mistakes with a continuous monitoring solution.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4730″><div class=”tp-tab”><span class=”tp-tab-image seven”></span><span class=”numero”>5</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>UCLA Health</span><span class=”tp-tab-date”>The UCLA Health data breach underscores a responsibility to implement detection and response solutions that mitigate damage done by hackers.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4738″><div class=”tp-tab”><span class=”tp-tab-image nine”></span><span class=”numero”>4</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Comcast</span><span class=”tp-tab-date”>Comcast Customers are victims of data exfiltration and shared hacks via other companies.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4740″><div class=”tp-tab”><span class=”tp-tab-image ten”></span><span class=”numero”>3</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>IRS</span><span class=”tp-tab-date”>The IRS seems to be the vehicle — rather than initial victim — of these attacks. Compromised endpoints could have played a role in previous, outside hacks.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4745″><div class=”tp-tab”><span class=”tp-tab-image eleven”></span><span class=”numero”>2</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Marriott</span><span class=”tp-tab-date”>Point-of-Sale systems can particularly benefit from continuous endpoint visibility that combines behavioral analytics.</span> </span></div></a></div> <div class=”hermes”><a href=”http://ziften.com/?p=4690″><div class=”tp-tab”><span class=”tp-tab-image one”></span><span class=”numero”>1</span> <span class=”tp-tab-content”> <span class=”tp-tab-title”>Anthem</span><span class=”tp-tab-date”>The Anthem hack is a cautionary tale: find out how Ziften can protect against health care data leaks.</span> </span></div></a></div> [/blox_raw][“true” extra_class=”trialFooter”][blox_sidebar sidebar=”giveaway-form”/]