Data breach

Results: 1224



#Item
221Computer security / Secure communication / Electronic commerce / Data security / Data breach / Internet privacy / Malware / Threat / Payment Card Industry Data Security Standard / Computer network security / Security / Cyberwarfare

01000101010101100100111001010100010110000100100101000111010110010100100101001101010101110101001101001110010001010 1001000010001010100100101000101010001100100111101010100010110000100001001010011010000110101011101011001010

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-05-01 12:59:52
222Wales / Breach / Statistics / Translation / Communications protocol / Information / Data / Welsh language

Service settings & places regulated by Care and Social Services Inspectorate Wales (CSSIW), July - September 2014

Add to Reading List

Source URL: www.statisticsauthority.gov.uk

Language: English
223Security / Electronic commerce / Secure communication / Data privacy / Data breach / Payment Card Industry Data Security Standard / Malware / Vulnerability / Threat / Computer network security / Cyberwarfare / Computer security

01000101010101100100111001010100010110000100100101000111010110010100100101001101010101110101001101001110010001010 1001000010001010100100101000101010001100100111101010100010110000100001001010011010000110101011101011001010

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2012-02-13 19:00:00
224Crimes / Identity / Identity theft / Theft / Information security / Personally identifiable information / United States Code / Security breach notification laws / Personal Data Privacy and Security Act / Security / Government / Computer security

PDF Document

Add to Reading List

Source URL: www.le.state.ut.us

Language: English - Date: 2006-04-25 15:13:30
225Electronic commerce / Economics / MasterCard / Debit card / Merchant services / Visa Inc. / Data breach / Merchant account / Redecard / Credit cards / Payment systems / Business

This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. http://www.wsj.com/articles/target-ne

Add to Reading List

Source URL: www.nilsonreport.com

Language: English - Date: 2015-04-16 08:49:08
226Computer network security / Secure communication / National security / Identity theft / Data breach / Information security / Internet privacy / Credit card / Privacy / Security / Computer security / Data security

1 Campus Invasion: Security Breaches and Their Trends in Universities Across the U.S. Christopher Cook & Morgan MacBaisey Introduction

Add to Reading List

Source URL: www.ethicapublishing.com

Language: English - Date: 2009-02-01 12:27:46
227Data security / Cyberwarfare / Crime prevention / National security / Information security / Security controls / Payment Card Industry Data Security Standard / Internet privacy / Data breach / Security / Computer security / Computer network security

Insights Insights Accounting Cyber threats

Add to Reading List

Source URL: bswllc.com

Language: English - Date: 2014-01-02 11:12:19
228Computer network security / Computing / Cyberwarfare / Data breach / Secure communication / Information security / Data loss / Password / Laptop / Data security / Security / Computer security

Data Breach QuickView An Executive’s Guide to Data Breach Trends in 2012 Sponsored by: Risk Based Security Open Security Foundation

Add to Reading List

Source URL: www.riskbasedsecurity.com

Language: English - Date: 2013-02-11 00:41:35
229Cryptography / Computing / Secure communication / National security / Computer security / Filesystem-level encryption / Data security / Linoma Software / Encryption / Disk encryption / Security / Cryptographic software

A LINOMA SOFTWARE WHITE PAPER Defending Against Data Breach Developing the Right

Add to Reading List

Source URL: www.cyberdefensemagazine.com

Language: English - Date: 2015-04-28 16:05:41
230Electronic commerce / Crime / Cyberwarfare / Data privacy / Computer crimes / Data breach / Identity theft / Malware / Payment Card Industry Data Security Standard / Security / Computer network security / Secure communication

3 color blend star [Converted]

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2010-07-29 08:47:15
UPDATE