Menu

data breach - News, Features, and Slideshows

data breach in pictures

News about data breach
Tutorials about data breach
  • How to protect yourself against privileged user abuse

    By By Michael Crouse | 28 June, 2014 04:12

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • Six ways to prevent a breach like the one at AT&T

    By Antone Gonsalves | 18 June, 2014 22:42

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

  • How to Test the Security Savvy of Your Staff

    By Kim Lindros and Ed Tittel | 24 February, 2014 13:58

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

Features about data breach
  • Security Manager's Journal: Breaches are everywhere

    By By J.F. Rice | 12 February, 2015 05:01

    Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.

  • Breaches are a personal nightmare for corporate security pros

    By Tim Greene | 29 January, 2015 02:48

    Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards.

  • Sorriest technology companies of 2014

    By Bob Brown | 30 September, 2014 01:11

    It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.

  • CIO Discovers the 'Terrifying' Reality of Cloud Apps Running Wild

    By Tom Kaneshige | 10 May, 2014 03:38

    Rogue cloud services are ripping gaping holes in the security fabric of most companies, putting the CIO in a tough spot. But as the fallout from the Target attack shows, IT and business leaders will go down together if the breach hits the fan.

  • 'HoneyDocs' lays irresistible bait for hackers

    By Jeremy Kirk | 17 September, 2013 12:01

    Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

Whitepapers about data breach

  • Responding to - and recovering from - sophisticated security attacks

    We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to - and recovering from - sophisticated security attacks” details four proactive steps that you can - and should - take now to help keep your organisation safe: prioritise your business objectives and set your risk tolerance; protect your organisation with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organisation safe from sophisticated security attacks and find out how IBM can help.

  • Internet Security Threat Report 2014

  • 2012 Data Breach Investigations Report