Security breaches

Results: 272



#Item
41Computer network security / One-time password / Hacker / Privileged password management / Security / Password / Computer security

Weekly updateData breaches In February US healthcare insurer Anthem Blue Cross disclosed that they had discovered evidence they had been hacked in January, potentially exposing the data of up to 80 million cu

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2015-03-19 12:17:24
42Telehealth / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Encryption / Computer security / Tamper resistance / EHealth / Law / Cryptography / Health / Health informatics

healthKrypt™: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

Add to Reading List

Source URL: aventyn.com

Language: English - Date: 2009-11-04 19:10:07
43Data / Information / Database / Data management / Data security / Database management systems / Data masking / Databases

DataVantage Global®: An Enterprise Data Masking, Data Management & Compliance Solution for Distributed Environments A Cost-Effective Solution to Manage, Mask and De-Identify Data Safely to Help Prevent Data Breaches

Add to Reading List

Source URL: datavantage.com

Language: English - Date: 2014-06-30 14:43:04
44Computer security / Cyberwarfare / Analysis / Netflow / Packet capture / Data security / Network intelligence / Security event manager / Security information and event management / Computer network security / Computing / Deep packet inspection

Use Case Study Security Information and Event Management (SIEM) Use Case With 5 Billion IoT devices by the end of this decade*, next generation SIEMs need to tackle latest security breaches and issues with advanced anal

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-05-28 10:26:33
45Cyberwarfare / Stateful firewall / Firewall / Virtual firewall / Check Point / Computer network security / Computer security / Computing

Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest

Add to Reading List

Source URL: www.spiritcom.com

Language: English - Date: 2014-12-10 12:02:02
46Computer security / Data breach / Data security / Secure communication / Hacker / Identity theft / Computing / Computer network security / Cyberwarfare

BLOG from Advent Resources DATA BREACHES AND THE NEW CAR DEALERSHIP Feb 17 Private data breaches are nothing new and could even be considered common place in today’s digitally connected world. We’ve all heard about

Add to Reading List

Source URL: automotivedigest.com

Language: English - Date: 2015-02-24 14:09:20
47Business / Security / Information security / SOX 404 top–down risk assessment / Auditing / Internal audit / Risk

2015 State of IT Changes Survey Regardless the size 70% of IT teams make undocumented changes and put their systems at risk of security breaches

Add to Reading List

Source URL: www.netwrix.com

Language: English - Date: 2015-04-21 16:46:42
48Statistics / Data management / Natural language processing / Statistical natural language processing / Formal sciences / Analytics / Text analytics / Text mining / Geographic information system / Science / Data analysis / Business intelligence

SureView® Analytics Security Operations Incident response investigative intelligence enterprise application rapidly mitigates the costs and risks of breaches with a low total cost

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
49Hacking / Military technology / Security / War / Crime / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Electronic warfare / Computer crimes

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
50Data security / Government / Human rights / National security / Identity theft / Privacy / Internet privacy / Personally identifiable information / Contract / Security / Ethics / Computer security

Key Steps for Clubs in Responding to Privacy Breaches and Privacy Breach Checklist Attached are two documents: Key Steps for Clubs in Responding to Privacy Breaches and a Privacy Breach Checklist that will help clubs com

Add to Reading List

Source URL: www.nzfootball.co.nz

Language: English - Date: 2015-04-09 19:46:21
UPDATE