Security breaches

Results: 272



#Item
81File deletion / Data security / File managers / Data erasure / Trash / Lavasoft / Paper shredder / Ad-Aware / Shred / Computing / System software / Software

FILE SHREDDER Take control of the confidental information on your PC! Digital information is increasingly stored on our computers, leaving the door wide open to security and privacy breaches. Even after you think you hav

Add to Reading List

Source URL: www.lavasoft.com

Language: English - Date: 2011-12-19 07:14:44
82Technology / Computer security / Payment systems / Marketing / Computer network security / Data breach / Online shopping / PayPal / Electronic commerce / Security / Business

5 Myths about the Business Impact of Data Breaches: Preventing a Data Breach from Killing Holiday Spend By Brett Conradt, Director, Stax Inc. & Audre Kapacinskas, Consultant, Stax Inc. 5 Myths about the Business Impact

Add to Reading List

Source URL: www.stax.com

Language: English - Date: 2015-03-10 13:37:40
83Computer network security / Software testing / Rapid7 / Metasploit Project / HD Moore / Phishing / Nebraska Public Power District / Attack / Penetration test / Software / Computer security / System software

case study | Nebraska Public Power District Fights Phishing, Meets Compliance Requirements with Nexpose and Metasploit The ripple effects of headline-making breaches, along with the increasingly sophisticated tactics at

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-04-24 12:49:50
84Computer network security / Computer security / Computing / Companies listed on the New York Stock Exchange / Malware / Phishing / Threat / McAfee VirusScan / Web threat / McAfee / Software / Antivirus software

Business Brief Top Five Endpoint Security Tips for SMBs Stop being vulnerable to hackers We all have heard of security attacks and corporate data breaches where millions of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:20
85Ethics / Risk management / Risk / Financial crises / Information security / Cyberwarfare / Late-2000s financial crisis / Systemic risk / Management / Actuarial science / Security

Risk Nexus Beyond data breaches: global interconnections of cyber risk April 2014 Contents

Add to Reading List

Source URL: www.jasadvisors.com

Language: English - Date: 2014-12-30 19:12:46
86Security / Data security / Cisco Systems / Videotelephony / Certis CISCO / Security controls / Information security / Attack / Threat / Computer security / Cyberwarfare / Computer network security

At-a-Glance Cisco Security Incident Response Service Today’s Dynamic Threat Landscape Organizations are under attack everywhere. In 2014, security breaches

Add to Reading List

Source URL: www.cisco.com

Language: English
87Business / Public safety / National security / Computer security / Computer network security / Information security / Electronic business / Security guard / Outsourcing / Security / Electronic commerce / Crime prevention

Information Security Breaches Survey 2002 T E C H N I C A L In association with:

Add to Reading List

Source URL: www.vicomsoft.com

Language: English - Date: 2011-05-13 11:58:43
88Cyberwarfare / Computer network security / Secure communication / Data security / Military technology / Data breach / Personally identifiable information / Rapid7 / Federal Information Security Management Act / Security / Computer security / Computing

Data Breaches in the Government Sector A Rapid7 Research Report Summary of Report Across all industries, data breaches and the protection of business-critical data remain a top concern. While the government sector has r

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-30 10:06:38
89Security / Computer network security / Data breach / Data security / Secure communication / Medical privacy / NHS foundation trust / Big Brother Watch / Medical record / Health / National Health Service / NHS England

NHS Data Breaches A Big Brother Watch Report November 2014 2

Add to Reading List

Source URL: www.bigbrotherwatch.org.uk

Language: English - Date: 2015-03-26 12:37:58
90Electronic commerce / Crime prevention / National security / Data security / Information security / Payment Card Industry Data Security Standard / Application security / Password / Vulnerability / Security / Computer security / Cyberwarfare

SECURE APPLICATION DEVELOPMENT Secure applications and websites play a big role in your overall security profile. With so many highprofile data security breaches, auditors and regulators are paying particularly close att

Add to Reading List

Source URL: www.mediapro.com

Language: English - Date: 2014-08-27 17:14:50
UPDATE