Security breaches

Results: 272



#Item
131Cyberwarfare / Electronic warfare / Hacking / Military technology / Computer crimes / LulzSec / Computer security / United States Department of Homeland Security / Operation AntiSec / Cybercrime / Security / Crime

BACKGROUNDER No. 2695 | May 24, 2012 The Alarming Trend of Cybersecurity Breaches and Failures in the U.S. Government Paul Rosenzweig

Add to Reading List

Source URL: thf_media.s3.amazonaws.com

Language: English - Date: 2012-05-24 15:28:20
132Computer security / Cyberwarfare / Data security / Data breach / National security / Identity theft / Safenet / Information privacy / Credit card / Security / Computer network security / Secure communication

BREACH LEVEL INDEX ANNUAL RECAP[removed]TOP BREACHES BY TYPE

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2014-02-14 15:17:44
133Computer security / Secure communication / Electronic commerce / National security / Crimeware / Data loss / Threat / Data breach / Vulnerability / Computer network security / Cyberwarfare / Security

Vertical Insight[removed]Data Breach Investigations Report HEALTHCARE Data breaches can be

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2014-05-12 20:00:00
134Two-factor authentication / Security token / Password / Authentication / Multi-factor authentication / Software token / Anakam / Password manager / Security / Access control / Computer security

A GUIDE TO PHONE-BASED PASSWORD PROTECTION (SAMPLE CODE INCLUDED) The increasing frequency of password breaches, along with other forms of cyber attack, make strong

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-04-22 19:57:52
135Security / National security / Secure communication / Threat / Attack / SecureWorks / Malware / Department of Defense Cyber Crime Center / Department of Defense Strategy for Operating in Cyberspace / Computer network security / Cyberwarfare / Computer security

Marcelle Lee Diversity in Tech: Increasing the Cyber Security Workforce Pipeline The demand for a qualified cybersecurity workforce has never been higher. With new reports of breaches virtually every day, it is clear tha

Add to Reading List

Source URL: www.acsc2015.com.au

Language: English - Date: 2015-01-20 00:19:29
136Cyberwarfare / Data security / Computer crimes / Cyber-security regulation / SCADA / International Multilateral Partnership Against Cyber Threats / Malware / Threat / Vulnerability / Computer security / Computer network security / Security

Breaches on the Rise in Control Systems: A SANS Survey A SANS Analyst Survey Written by Matthew Luallen Advisor: Derek Harp

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2014-04-24 14:38:55
137Policy / Privacy policy / Government / Internet privacy / Computing / Law / In re Gateway Learning Corp. / In the Matter of Sears Holdings Management Corporation / Federal Trade Commission / Privacy / Consumer protection

FTC. v. Wyndham Litigation By: Peter S. Bauman, Esq. http://commercialcounselor.com/ The Federal Trade Commission (“FTC”) has been active in recent years pursuing companies that suffer data security breaches and argu

Add to Reading List

Source URL: documents.jdsupra.com

Language: English - Date: 2012-11-30 12:53:58
138Policy / Privacy policy / Government / Internet privacy / Computing / Law / In re Gateway Learning Corp. / In the Matter of Sears Holdings Management Corporation / Federal Trade Commission / Privacy / Consumer protection

FTC. v. Wyndham Litigation By: Peter S. Bauman, Esq. http://commercialcounselor.com/ The Federal Trade Commission (“FTC”) has been active in recent years pursuing companies that suffer data security breaches and argu

Add to Reading List

Source URL: www.jdsupra.com

Language: English
139Policy / Privacy policy / Government / Internet privacy / Computing / Law / In re Gateway Learning Corp. / In the Matter of Sears Holdings Management Corporation / Federal Trade Commission / Privacy / Consumer protection

FTC. v. Wyndham Litigation By: Peter S. Bauman, Esq. http://commercialcounselor.com/ The Federal Trade Commission (“FTC”) has been active in recent years pursuing companies that suffer data security breaches and argu

Add to Reading List

Source URL: www.jdsupra.com

Language: English
140Security / Credit card / Data breach / Identity theft / Debit card / Payment card / Online shopping / Chip and PIN / EMV / Payment systems / Electronic commerce / Business

PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME

Add to Reading List

Source URL: consumersunion.org

Language: English - Date: 2014-02-03 17:57:51
UPDATE