.fusion-header-wrapper { padding-top: 0px;background: #000dbb !important;} #page-header { display:none;} .fusion-header-wrapper.fusion-is-sticky { visibility: visible;}.post-content {padding-top: 30px;}
/* CSS to help with ACF styling */ .fusion-logo img { opacity: 0; } .fusion-main-menu > ul > li > a { border-color: #444; } .fusion-logo-link { background: url(https://www.fairwarning.com/wp-content/themes/Avada-Child-Theme/images/dark-logos2.png); } .fusion-main-menu .fusion-main-menu-icon:after, .fusion-main-menu .fusion-widget-cart-counter > a:before { color: #696969; } .fusion-header { background-color: #fff !important; } .fusion-header-wrapper { padding-top: 0px; background: #ffffff !important; } .fusion-is-sticky .fusion-main-menu > ul > li > a { font-size: 14px; } .fusion-main-menu > ul > li > a, .fusion-main-menu > ul > li > a .fusion-menu-description { color: #444 !important; } .fusion-main-menu > ul > li > a:hover { color: #444 !important; font-weight: bold; } .fusion-body .fusion-main-menu .current-menu-parent > a { color: #444 !important; font-weight: bold !important; } .fusion-header-wrapper { background: transparent !important; }
/* CSS to help with ACF styling */ #page-header .h1 {color: #444;} #page-header h2.text-color-xsdn-color {color: #444;}
/* CSS to help with ACF styling */ #page-header .h1 {color: #fff;} #page-header h2.text-color-xsdn-color {color: #fff;}
/* CSS to help with ACF styling */ #page-header .h1 {color: ;} #page-header h2.text-color-xsdn-color {color: ;}
/* CSS to help with ACF styling */ #page-header {background-color: #031ac3;}
/* CSS to help with ACF styling */ #page-header {background: #fff url() center center; padding-top: 0px; padding-bottom: 0px; } @media all and (max-width: 4699px) and (min-width: 1925px) { .title-and-subtitle-background-image { padding-top: 3% !important; padding-bottom: 3% !important; } }
/* CSS to help with ACF styling */ #page-header {background: ;}

Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019 cybersecurity predictions, and more.

Starwood data breach

First Lawsuits Filed in Starwood Hotels’ Breach

Legal fallout has begun from the massive Starwood Hotels reservation breach reported last week, with class-action suits filed on behalf of guests and investors. Here’s what to expect.

60 Cybersecurity Predictions For 2019

Will 2019 be the year of protected privacy? According to Chris Babel, CEO of TrustArc, “Managing privacy will be the new normal, like securing data or paying taxes. Privacy will continue on a similar path as the evolution of cybersecurity. The number of breaches and privacy-related incidents will continue to rise, up and to the right. … Like with security, a standard of constant privacy will become the new normal.”

See this and 59 other cybersecurity predictions for 2019 from experts in all industries on Forbes.

Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects

As attacks become more sophisticated and business leaders continue to champion digital transformation, an organization’s success depends on a well-equipped security team. These trends have driven a shift in the skills and abilities that CISOs and other executives seek when hiring security talent.

So what skills are today’s CISOs looking for in a security architect?

7 Warning Signs of an Insider Threat

According to a CA report, over 50 percent of organizations suffered an insider threat-based attack in the previous 12 months, while one-quarter say they are suffering attacks more frequently than in the previous year. And according to Ponemon, a successful, malicious insider attack can cost companies an average of $600,000.

Here, CSO Online outlines the seven warning signs of an insider threat that all security-minded professionals must keep an eye on.

Shadow IT is Alive and Well: One-Third of Employees Deploy Their Own Software

According to SailPoint’s 2018 Market Pulse Survey, employees see IT as an “inconvenience,” and often search for ways to get around security measures. As a result, Shadow IT has exploded, with 31 percent — 11 percent more than four years ago – say they or one of their colleagues have purchased and/or deployed software without IT’s help. But IT can’t make the organization secure if the user is working in the exact opposite direction.

Are your users’ attitudes toward IT putting the organization at risk of a cyber attack?

The Value of Having A Dedicated Salesforce Integration User

AppExchange vendors are thoroughly vetted, which means you can trust these partners to enhance your Salesforce investment without compromising your security. Nonetheless, connecting external tools to your Salesforce instance can present a challenge to Salesforce Admins: How do you ensure all your integrations are stable, auditable, and secure?

A dedicated integration user can be a great way to address this challenge, helping you manage integrations more seamlessly while increasing your productivity and saving you time. Here’s how.

Closing the Awareness Gap to Create a Security-Positive Culture

Security professionals, now more than ever, understand that individuals play a huge role in protecting the organization’s information at large. With more and more initiatives focused on the “human factor” or “human firewall,” it’s important to remember that end users can be leveraged as a protective measure, rather than a liability or vulnerability.

Here, you’ll find several best practices from leading organizations, government researchers, and academics, which can be applied to help you develop a more security-positive culture.