data breach - News, Features, and Slideshows
data breach in pictures
Pirate Bay co-founder Gottfrid Svartholm Warg was sentenced Friday by the Court of Frederiksberg in Denmark to three and a half years in jail for hacking and serious vandalism.
By Loek Essers | 01 November, 2014 01:55
Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing.
By Jeremy Kirk | 29 October, 2014 14:07
The number of personal records compromised by data breaches in California surged to 18.5 million in 2013, up more than six times from the year before, according to a report published on Tuesday by the state's Attorney General.
By Martyn Williams | 29 October, 2014 06:03
Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from three different manufacturers.
By Lucian Constantin | 21 October, 2014 03:11
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
By Network World staff | 16 September, 2008 09:53
Whitepapers about data breach
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTClient Service Director - Search: SEO & PPCNSW
- FTDigital Marketing CoordinatorNSW
- FTDigital Performance Manager - MediaNSW
- FTStudio Design ManagerVIC
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTAccount Manager - DataNSW
- FTSenior SEO ManagerNSW
- FTChief Information Officer - CSIROACT
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
- North Korea reportedly blocks Facebook and Twitter
- FCC eyes new rules to protect consumers as voice networks transition to IP
- Startup Slack gets $120M infusion to kill email at work
- Oracle's Larry Ellison isn't done building his legacy
- Microsoft Releases NEW Office for the Mac (Oct/2014)
- Microsoft teases Office for Mac with Outlook-only release
- Ericsson's WebRTC browser available for download from the App Store
- HP to jolt 3D printer market
- Starbucks says 1 in 6 payments already mobile
- HP's radical new Machine could start computing by 2016
- Apologetic Microsoft unleashes Xim globally for Android, Win Phone
- FCC: A range of net neutrality options remain on the table
- iOS 8 app crash rate falls 25% since release
- Pirate Bay co-founder sentenced to 3.5 years imprisonment in Denmark
- Google to kill off SSL 3.0 in Chrome 40