Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

data breach - News, Features, and Slideshows

data breach in pictures

News about data breach
Tutorials about data breach
  • How to protect yourself against privileged user abuse

    By By Michael Crouse | 28 June, 2014 04:12

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • Six ways to prevent a breach like the one at AT&T

    By Antone Gonsalves | 18 June, 2014 22:42

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

  • How to Test the Security Savvy of Your Staff

    By Kim Lindros and Ed Tittel | 24 February, 2014 13:58

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

Features about data breach
  • Sorriest technology companies of 2014

    By Bob Brown | 30 September, 2014 01:11

    It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.

  • CIO Discovers the 'Terrifying' Reality of Cloud Apps Running Wild

    By Tom Kaneshige | 10 May, 2014 03:38

    Rogue cloud services are ripping gaping holes in the security fabric of most companies, putting the CIO in a tough spot. But as the fallout from the Target attack shows, IT and business leaders will go down together if the breach hits the fan.

  • 'HoneyDocs' lays irresistible bait for hackers

    By Jeremy Kirk | 17 September, 2013 12:01

    Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

  • IT Concerns About Targeted Malware Rising

    By Thor Olavsrud | 28 March, 2013 13:30

    IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.

  • Chinese Government's Link to Cyber Espionage Clearer Than Ever

    By Thor Olavsrud | 20 February, 2013 16:09

    It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.

Whitepapers about data breach

Computerworld
ARN
Techworld
CMO