

“Identity graph technologies can help savvy organizations recognize attacker tactics across the whole identity lifecycle, including provisioning and account maintenance.
#T MOBILE BREACH LICENSE#
The breach includes names, driver's license numbers, Social Security numbers and device. To succeed against dynamic cybercriminals, organizations must invest time and resources into building a learning system that evolves to keep up with attacker tactics, says Gunnar Peterson, Chief Information Security Officer (CISO) at Forter. The alleged hacker behind T-Mobile's latest cyberattack has spoken out about the August hack. “Using the dual approach of visibility and protection, data protection teams can know for certain which data stores are valuable targets and ensure proper controls, which allows for quicker discovery of any data leakage.”

Solutions need to be completely integrated with the cloud in order to identify potential risks and have a deeper understanding of where the data reside, Avraham says. While the adversaries did not successfully extract any sensitive data in this instance, this breach should remind us that with a majority of the world’s data residing in the cloud, it is imperative that security becomes data-centric and solutions become cloud-native,” explains Oran Avraham, Chief Technology Officer at Laminar. T-Mobile disclosed the data breach on Thursday to the Securities and Exchange Commission. Information within an organization’s network is valuable to attackers and can be leaked to encourage future attacks on a company. “Data is no longer a commodity it’s a currency - as this incident represents. The company says it continues to investigate the breach but believes it is. While T-Mobile claims sensitive data was not stolen, it is the sixth breach the company has experienced since 2018. T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. T-Mobile (TMUS) was able to discover the source of the breach and stop it a day after the hack was discovered.
