Data breach

Results: 1224



#Item
301Computing / SQL keywords / SQL / Relational database / Select / Join / Database / Extensible Storage Engine / View / Data management / Database management systems / Database theory

PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting Daniel Fabbri∗, Kristen LeFevre∗ , Qiang Zhu† ∗ †

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2010-11-10 08:01:22
302Cyberwarfare / Computer network security / Data breach / Secure communication / Information security / Computer security / Security / Data security

InfoSec Who, Why, What, When and Where? InfoSec Who is Presenting?

Add to Reading List

Source URL: static.coreapps.net

Language: English - Date: 2015-03-06 15:37:15
303Security / Criminal law / Identity theft / Fraud / Identity Theft Resource Center / Action-adventure games / Identity fraud / Robert Siciliano / Data breach / Crimes / Identity / Theft

Identity Theft: The Aftermath 2013™ Conducted by the Identity Theft Resource Center® (ITRC) i With comparisons to previous Aftermath Surveys Original data analyzed by: The Identity Theft Resource Center

Add to Reading List

Source URL: norsis.no

Language: English - Date: 2014-11-12 08:49:36
304Computer network security / Software testing / Data security / Application security / OWASP / Data breach / Vulnerability / Computer security / Cyberwarfare / Security

Your most valuable asset: your users’ data Dr Konstantinos Papapanagiotou Innovating for Privacy, Athens, [removed]

Add to Reading List

Source URL: ellak.gr

Language: English - Date: 2015-04-06 07:50:31
305Cyberwarfare / National security / Data breach / Information security / Credit card / Malware / Internet privacy / Database / Remote data deletion / Data security / Security / Computer security

The following diagram illustrates the activity-based costing schema used in the current benchmark study

Add to Reading List

Source URL: essextec.com

Language: English - Date: 2014-07-14 16:28:48
306Identity theft / Phishing / Data breach / Internet fraud / Hong Kong Identity Card / Credit card / Hong Kong / Fraud / Theft / Crimes / Security / Law

Microsoft PowerPoint - 2. Protiviti-Merchant security.ppt [相容模式]

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:20
307Data security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Institutional investors / Employee Retirement Income Security Act / Health insurance / Data breach / Information security / Security / Computer security / Ethics

Need for Cyberliability Insurance Continues to Grow

Add to Reading List

Source URL: www.segalco.com

Language: English - Date: 2015-04-08 13:43:05
308Security / Data security / Threat / Verizon Communications / Data breach / Malware / Vulnerability / Cyberwarfare / Computer security / Computer network security

2009 Data Breach Investigations Report Henry Ng, CISSP-ISSAP CISA Head of Professional Services Asia Verizon Business Global Services

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:21
309Cyberwarfare / Electronic commerce / Computer security / Data breach / Data security / Malware / Information privacy / World Wide Web / Computer network security / Security / Secure communication

THE BITGLASS “WHERE’S YOUR DATA?” EXPERIMENT Who’s Keeping tabs on your data? BITGLASS REPORT The Bitglass “Where’s Your Data?” Experiment

Add to Reading List

Source URL: pages.bitglass.com

Language: English - Date: 2015-04-14 01:20:30
310Computing / Internet privacy / Information privacy / Personally identifiable information / National Strategy for Trusted Identities in Cyberspace / Consumer privacy / Data breach / Medical privacy / FTC regulation of behavioral advertising / Privacy / Ethics / Security

CTO Corner September 2012 Striking a Balance between Privacy and Security Transformation Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:20
UPDATE