Results tagged "data breaches"
Total Search Results : 11
Data Breaches, Attacks Still Have IT Security Worried, Survey Finds
May 21, 2012 09:52 AM
Fifteen percent of respondents to the InformationWeek 2012 Strategic Security Survey say they're more vulnerable to attacks and data breaches than they were. Learn why.Co3 Tackles One Of Security's Hidden Costs
September 13, 2011 08:00 AM
Billions are being spent annually on protecting information, but Co3 Systems is offering a unique solution for what to do after a data breach occurs. The Cambridge, Mass., software-as-a-service (SaaS) startup is announcing an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more efficiently. Its solution can cut incident response process time by as much as half, and can significantly reduce the risk, expense and resources associated with data loss events, says the company.GlobalSign Puts Holds On New Certificates Pending Security Investigation
September 07, 2011 10:09 AM
After boasts by the Comodo hacker that he'd compromised GlobalSign, the certificate authority (CA) on Tuesday announced that it would temporarily cease issuing any new certificates.'Operation Shady Rat' Perpetrated Five Years Of Long-Term Attacks On Government, Enterprises
August 04, 2011 11:00 AM
More than 70 government agencies, large commercial enterprises and other organizations have been victims of a series of long-term targeted attacks resulting in the loss of sensitive information and intellectual property during the last five years, according to an investigation by McAfee. In a probe dubbed Operation Shady RAT, researchers gained access to one of the attack servers and obtained detailed insight into the victims, the information stolen and the methods used.Black Hat Will Once Again Show Our Security Weaknesses
August 01, 2011 11:15 AM
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.Verizon Launches Service Based On Data Breach Report Methodology
June 22, 2011 08:00 AM
Verizon Business is offering an security incident analysis service based on the Verizon Incident Sharing framework (VerIS), the foundation of its highly regarded annual Data Breach Investigation Report (DBIR). The aim of the service is to generate metrics of an organization’s security incidents over time to discover the root causes of vulnerability and take preventive measures.Survey Shows 3 of 4 Companies Suffer Data Loss
June 13, 2011 08:00 AM
Research released this week by the Ponemon Institute reveals that more than three out of four organizations surveyed have experienced some kind of data loss within the last year. Some of the data loss occurred because of negligence on the part of an employee or a technical glitch, but an increasing percentage of the data breaches were the result of malicious criminal activity, underscoring the need for increased attention to DLP security.Enterprises Still Gambling on Mobile Device Security
December 01, 2006 05:00 AM
Given the rash of high-profile data breaches and the ease with which mobile devices can be lost or stolen, what reason could companies offer for failing to implement security policies?Credant Mobile Guardian 5.1 Enterprise Edition
April 05, 2006 04:00 AM
This mobile security platform takes a different -- and more secure -- tack than full hard-disk encryption products.Credant Mobile Guardian 5.1 Enterprise Edition
March 24, 2006 09:35 PM
This mobile security platform takes a different--and more secure--tack than full hard disk encryption products.1 | 2 | Next Page »










