Security breaches

Results: 272



#Item
41Weekly updateData breaches In February US healthcare insurer Anthem Blue Cross disclosed that they had discovered evidence they had been hacked in January, potentially exposing the data of up to 80 million cu

Weekly updateData breaches In February US healthcare insurer Anthem Blue Cross disclosed that they had discovered evidence they had been hacked in January, potentially exposing the data of up to 80 million cu

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2015-03-19 12:17:24
42healthKrypt™: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

healthKrypt™: Safeguarding Health Information 80% OF HEALTHCARE ORGANIZATIONS EXPERIENCE LOST AND STOLEN INFORMATION† Patient personal information and medical data breaches cost patients, providers and payors alike.

Add to Reading List

Source URL: aventyn.com

Language: English - Date: 2009-11-04 19:10:07
43DataVantage Global®: An Enterprise Data Masking, Data Management & Compliance Solution for Distributed Environments A Cost-Effective Solution to Manage, Mask and De-Identify Data Safely to Help Prevent Data Breaches

DataVantage Global®: An Enterprise Data Masking, Data Management & Compliance Solution for Distributed Environments A Cost-Effective Solution to Manage, Mask and De-Identify Data Safely to Help Prevent Data Breaches

Add to Reading List

Source URL: datavantage.com

Language: English - Date: 2014-06-30 14:43:04
44Use Case Study  Security Information and Event Management (SIEM) Use Case With 5 Billion IoT devices by the end of this decade*, next generation SIEMs need to tackle latest security breaches and issues with advanced anal

Use Case Study Security Information and Event Management (SIEM) Use Case With 5 Billion IoT devices by the end of this decade*, next generation SIEMs need to tackle latest security breaches and issues with advanced anal

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-05-28 10:26:33
45Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest

Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest

Add to Reading List

Source URL: www.spiritcom.com

Language: English - Date: 2014-12-10 12:02:02
46BLOG from Advent Resources  DATA BREACHES AND THE NEW CAR DEALERSHIP Feb 17 Private data breaches are nothing new and could even be considered common place in today’s digitally connected world. We’ve all heard about

BLOG from Advent Resources DATA BREACHES AND THE NEW CAR DEALERSHIP Feb 17 Private data breaches are nothing new and could even be considered common place in today’s digitally connected world. We’ve all heard about

Add to Reading List

Source URL: automotivedigest.com

Language: English - Date: 2015-02-24 14:09:20
472015 State of IT Changes Survey Regardless the size 70% of IT teams make undocumented changes and put their systems at risk of security breaches

2015 State of IT Changes Survey Regardless the size 70% of IT teams make undocumented changes and put their systems at risk of security breaches

Add to Reading List

Source URL: www.netwrix.com

Language: English - Date: 2015-04-21 16:46:42
48SureView® Analytics Security Operations Incident response investigative intelligence enterprise application rapidly mitigates the costs and risks of breaches with a low total cost

SureView® Analytics Security Operations Incident response investigative intelligence enterprise application rapidly mitigates the costs and risks of breaches with a low total cost

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
49deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

deloitte on technology No Such Thing as Hacker-proof Security breaches breakdown Top causes of data breaches1

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
50Data security / Government / Human rights / National security / Identity theft / Privacy / Internet privacy / Personally identifiable information / Contract / Security / Ethics / Computer security

Key Steps for Clubs in Responding to Privacy Breaches and Privacy Breach Checklist Attached are two documents: Key Steps for Clubs in Responding to Privacy Breaches and a Privacy Breach Checklist that will help clubs com

Add to Reading List

Source URL: www.nzfootball.co.nz

Language: English - Date: 2015-04-09 19:46:21