Menu

data breach - News, Features, and Slideshows

data breach in pictures

News about data breach
Tutorials about data breach
  • How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

    Written by By Michael Crouse28 June 14 04:12
  • Six ways to prevent a breach like the one at AT&T

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

    Written by Antone Gonsalves18 June 14 22:42
  • How to Test the Security Savvy of Your Staff

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

    Written by Kim Lindros and Ed Tittel24 Feb. 14 13:58
Features about data breach
  • Security Manager's Journal: Breaches are everywhere

    Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.

    Written by By J.F. Rice12 Feb. 15 05:01
  • Sorriest technology companies of 2014

    It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.

    Written by Bob Brown30 Sept. 14 01:11
  • CIO Discovers the 'Terrifying' Reality of Cloud Apps Running Wild

    Rogue cloud services are ripping gaping holes in the security fabric of most companies, putting the CIO in a tough spot. But as the fallout from the Target attack shows, IT and business leaders will go down together if the breach hits the fan.

    Written by Tom Kaneshige10 May 14 03:38
  • 'HoneyDocs' lays irresistible bait for hackers

    Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

    Written by Jeremy Kirk17 Sept. 13 12:01

Whitepapers about data breach

  • Responding to - and recovering from - sophisticated security attacks

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to - and recovering from - sophisticated security attacks” details four proactive steps that you can - and should - take now to help keep your organisation safe: prioritise your business objectives and set your risk tolerance; protect your organisation with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organisation safe from sophisticated security attacks and find out how IBM can help.

  • Internet Security Threat Report 2014

  • 2012 Data Breach Investigations Report

Market Place

Computerworld
ARN
Techworld
CMO