Security breaches

Results: 272



#Item
71Computing / CERT Coordination Center / European Network and Information Security Agency / Request Tracker / WARP / Cyber security and countermeasure / CERT Polska / Carnegie Mellon University / Internet governance / Computer emergency response team

Emergency Response to Security Breaches Figure 1: CERT network in Europe as of OctoberWhat is a CERT?

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
72Finance / Identity theft / Credit report monitoring / Credit card / Data breach / Credit bureau / Password / PayPal / Internet privacy / Financial economics / Credit / Security

Data Breaches: What You Can Do Preventative Tips To Help Navigate the Uncertainty PERSONAL INFORMATION EXPOSED? Hearing that your personal information could have been exposed in a data breach can be unnerving. Whether it

Add to Reading List

Source URL: cdn.infoarmor.com

Language: English - Date: 2015-03-19 12:41:02
73Cloud computing / Computer security / TitanFile / File sharing / Computer file / Accellion /  Inc. / Computing / Centralized computing / Cloud applications

Secure File Sharing Checklist Have you been considering secure file sharing options? Whether it’s because of the constant news of data breaches, or an internal situation that has made you reconsider how you store and

Add to Reading List

Source URL: www.titanfile.com

Language: English - Date: 2015-02-12 11:53:05
74File deletion / Data security / File managers / Data erasure / Trash / Lavasoft / Paper shredder / Ad-Aware / Shred / Computing / System software / Software

FILE SHREDDER Take control of the confidental information on your PC! Digital information is increasingly stored on our computers, leaving the door wide open to security and privacy breaches. Even after you think you hav

Add to Reading List

Source URL: lavasoft.com

Language: English - Date: 2011-12-19 07:14:44
75Computer security / Crimes / Identity / Identity theft / Theft / Health Insurance Portability and Accountability Act / Data breach / Internet privacy / Personally identifiable information / Security / Government / Law

Data Security and Breach Notification Act of 2015 Overview of Bipartisan Discussion Draft Authored By Energy and Commerce Committee Vice Chairman Marsha Blackburn (R-TN) and Rep. Peter Welch (D-VT) Data breaches are a gr

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2015-03-12 15:49:04
76Computer network security / VxWorks / Embedded system / Packet Processing / Deep packet inspection / Database / Wind River Systems / Server / Virtualization / Computing / Mattel / HyperScan

HYPERSCAN The current generation of advanced network security equipment is becoming overwhelmed by ever-increasing data traffic, resulting in performance bottlenecks and a growing number of security breaches from malicio

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:12
77Computer security / Computer network security / Veracode / Software testing / Application security / Software as a service / Vulnerability / Application firewall / Computing / Centralized computing / Cloud computing

VERACODE APPLICATION SECURITY Speed your innovations to market — without sacrificing security Web applications are the #1 attack vector for data breaches, yet only 10% of enterprises test all their critical application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-04-14 16:19:18
78Shavlik Technologies / Computer security / Data privacy / Electronic commerce / Electronic health record / Patch / Health Insurance Portability and Accountability Act / Personal digital assistant / Security / Computer network security / Health

Healthcare IT Solutions from Shavlik® SECURE I T OR LOSE I T Let’s face it. Today’s computing environment is a scary place. We’ve witnessed a rash of security breaches making headlines in retail. But seething unde

Add to Reading List

Source URL: rs.shavlik.com

Language: English - Date: 2015-03-31 13:16:02
79Data security / Cyberwarfare / Financial institutions / Institutional investors / Computer network security / Data breach / Insurance / Internet privacy / Mediation / Computer security / Security / Investment

Data Breach Response A Nine-Step Guide for Smaller Merchants Data breaches at large retailers draw plenty of media attention. But, by far, the most common targets of data breaches are not big businesses. They are small

Add to Reading List

Source URL: www.electran.org

Language: English - Date: 2014-11-21 16:31:32
80Cyberwarfare / Stateful firewall / Firewall / Virtual firewall / Check Point / Computer network security / Computer security / Computing

Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest

Add to Reading List

Source URL: spiritcom.com

Language: English - Date: 2014-12-10 12:02:02
UPDATE