Data breach

Results: 1224



#Item
471Security / Data breach / Cyberwarfare / Financial institutions / Institutional investors / Insurance

C Y BER CL A IMS S T U DY 2014 INTRODUC TION

Add to Reading List

Source URL: www.netdiligence.com

Language: English - Date: 2014-12-02 13:01:09
472Computer law / Government / Computer security / Data security / 106th United States Congress / Gramm–Leach–Bliley Act / Identity theft / Data breach / Federal Reserve System / United States federal banking legislation / Security / Law

November 12, 2014 The Honorable Harry Reid Senate Majority Leader 522 Hart Senate Office Building Washington, DC[removed]

Add to Reading List

Source URL: www.icba.org

Language: English - Date: 2014-11-12 12:09:41
473Education in the United States / Identity management / Social issues / New York State Education Department / Internet privacy / Privacy Office of the U.S. Department of Homeland Security / Information privacy / Personally identifiable information / Data breach / Ethics / Security / Privacy

Parents Bill of Rights for Data Privacy and Security Pursuant to Education Law section 2-d, school districts are now required to publish, on their websites, a parents bill of rights for data privacy and security and to i

Add to Reading List

Source URL: www.ovcs.org

Language: English - Date: 2014-10-09 08:17:06
474Payment systems / Cyberwarfare / Secure communication / Electronic commerce / Computer security / Data breach / Malware / Spyware / Credit card / Computer network security / Security / Technology

How Lender Liability Losses Turn Into Class Action Lawsuits

Add to Reading List

Source URL: prtlimages.cunamutual.com

Language: English - Date: 2014-10-21 17:11:02
475Security / Computer security / Computer crimes / Secure communication / Hacking / Malware / Data breach / SurfWatch / Attack / Computer network security / Cyberwarfare / Cybercrime

December Attacks Highlight Need for Good Vulnerability Management For the December 2014 Period Copyright © 2015 SurfWatch Labs, Inc. All rights reserved

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:09
476Security / Credit card / Data breach / Identity theft / Debit card / Payment card / Online shopping / Chip and PIN / EMV / Payment systems / Electronic commerce / Business

PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME

Add to Reading List

Source URL: consumersunion.org

Language: English - Date: 2014-02-03 17:57:51
477Civil law / Civil procedure / Tort law / Negligence / Class action / Data breach / Standing / Identity theft / Damages / Law / Legal terms / Contract law

Critical network vulnerability concept

Add to Reading List

Source URL: classactionblawg.files.wordpress.com

Language: English - Date: 2014-10-16 20:04:47
478Computing / Malware / Rapid7 / Password / Email / Computer virus / Software / System software / Antivirus software

You’re Only as Strong as Your Weakest Link: Securing the Endpoint Endpoint Risk According to the 2013 Verizon Data Breach Investigations Report, 71% of attacks and breaches in 2012 involved compromised end-user devices

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:24
479Cyberwarfare / Computer network security / Secure communication / Data security / Military technology / Data breach / Personally identifiable information / Rapid7 / Federal Information Security Management Act / Security / Computer security / Computing

Data Breaches in the Government Sector A Rapid7 Research Report Summary of Report Across all industries, data breaches and the protection of business-critical data remain a top concern. While the government sector has r

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:20
480Internet privacy / Information privacy / Data mining / Medical privacy / De-identification / Ann Cavoukian / Consumer privacy / Data breach / Data sharing / Privacy / Ethics / Ethology

ITIF Submits Comments to the National Science Foundation for a National Privacy Research Strategy

Add to Reading List

Source URL: www2.itif.org

Language: English - Date: 2014-10-17 12:03:20
UPDATE