Security breaches

Results: 272



#Item
141Cyberwarfare / Computer network security / Secure communication / Data security / Military technology / Data breach / Personally identifiable information / Rapid7 / Federal Information Security Management Act / Security / Computer security / Computing

Data Breaches in the Government Sector A Rapid7 Research Report Summary of Report Across all industries, data breaches and the protection of business-critical data remain a top concern. While the government sector has r

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:20
142Computer network security / Software testing / Rapid7 / Metasploit Project / HD Moore / Phishing / Nebraska Public Power District / Attack / Penetration test / Software / Computer security / System software

case study | Nebraska Public Power District Fights Phishing, Meets Compliance Requirements with Nexpose and Metasploit The ripple effects of headline-making breaches, along with the increasingly sophisticated tactics at

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:12
143Crime prevention / Cyberwarfare / Electronic commerce / Data security / Information security / Payment Card Industry Data Security Standard / Security controls / Security guard / Vulnerability / Security / Computer security / Computer network security

Pluralsight Offers CEOs Five Security Tips to Prevent Cyber Attacks Global e-Learning Leader Suggests Ways Executives Can Prepare for and Prevent Digital Breaches for Companies Worldwide SALT LAKE CITY – (June 17, 2014

Add to Reading List

Source URL: blog.pluralsight.com

Language: English - Date: 2014-06-13 17:42:57
144Data security / Human–computer interaction / Notification system / Privacy / Identity theft / Data breach / Information privacy / Personally identifiable information / Internet privacy / Security / Computer security / Ethics

Notification of PECR security breaches

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-01-13 05:58:01
145Data security / Human–computer interaction / Notification system / Privacy / Identity theft / Data breach / Information privacy / Personally identifiable information / Internet privacy / Security / Computer security / Ethics

Notification of PECR security breaches

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-10-13 07:06:29
146Crime prevention / National security / Password / Database management systems / Data management / Laptop / SQL injection / Database / Computer security / Security / Computing / Computer network security

Enforcement and Good Practice workshop Recognising and acting on risk Sally-Anne Poole - Data Breaches Group Manager Jo Stones - Enforcement Team Manager

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-10-07 10:17:56
147Identity theft / Theft / Personally identifiable information / Data breach / Personal Data Privacy and Security Act / Fair and Accurate Credit Transactions Act / Security / Crimes / Identity

Opening Statement of the Honorable Fred Upton Subcommittee on Commerce, Manufacturing, and Trade Hearing on “Protecting Consumer Information: Can Data Breaches Be Prevented?” February 5, 2014 (As Prepared for Deliver

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2014-02-05 14:46:45
148Computer security / Cyberwarfare / Data security / National security / Data breach / Credit card / Security / Computer network security / Secure communication

Opening Statement of the Honorable Lee Terry Subcommittee on Commerce Manufacturing and Trade Hearing on “Protecting Consumer Information: Can Data Breaches Be Prevented?” February 5, 2014 (As Prepared for Delivery)

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2014-02-05 09:26:05
149Electronic commerce / Computing / Computer law / Computer security / Business / Payment Card Industry Data Security Standard / Payment card industry / Information security / SecurityMetrics / Payment systems / Data privacy / Credit cards

PCI Compliance: Protection Against Data Breaches Get Started Now: [removed]to learn more. www.megapath.com

Add to Reading List

Source URL: www.megapath.com

Language: English - Date: 2015-01-19 19:41:08
150Spamming / Computer network security / Hacking / Antivirus software / Symantec / Malware / Cross-site scripting / Phishing / Firefox / Software / Computing / Computer security

FigXX_data_breaches_by_sector_v1

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:01
UPDATE