In healthcare, financial services and other sectors, information breaches are an epidemic. More than 400 major healthcare breaches have been reported since late 2009. And headline-grabbing breaches in the financial services sector, such as the Sony and Global Payments incidents, illustrate why preventing breaches -...
How well do government agencies secure printing and imaging assets?
A new survey by Information Security Media Group and HP shows a significant disconnect between what agencies say about print security .. and what they are actually doing to ensure it.
To learn more about the state of print security at U.S....
FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
In response to Congress' request for additional information, the Federal Retirement Thrift Investment Board has changed its story about how it found out about a July 2011 breach affecting its Thrift Savings Plan.
Today's enterprises and government agencies are faced with advanced persistent threats (APTs). These attacks often use social engineering and other techniques to gain a beachhead on corporate networks. From there they probe and use "privilege escalation" to gain access to high-value information and then use stealthy...
Nearly three-quarters of surveyed professionals say concerns regarding data security prevent their organizations from adopting cloud services. And more than half of the respondents say their own services are more secure than those offered by cloud providers.
These are among the findings of the new 2012 Cloud...
The Texas attorney general furnished lawyers challenging the state voter ID law encrypted disks of a database of 13 million voters, with about half displaying citizens' full Social Security numbers.
What do the proposed Stage 2 rules for the HITECH Act electronic health record incentive program have to say about encryption and other security measures? Consumer advocate Deven McGraw provides an analysis.
With many questions surrounding the Global Payments breach left unanswered, how should card issuers respond to customers' concerns? ID theft expert Neal O'Farrell offers communications tips.
Today's threat landscape is challenging enough. But what happens when organized crime adopts the techniques developed by hacktivists? Learn more about the top 10 threats to security by 2014.
The FTC proposes that privacy protections be built at every stage in developing online products and consumers be given the option to decide what information is shared about them and with whom through a do-not-track system.
The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
Hacking is behind most large-scale data breaches. What steps can organizations and leaders take to safeguard their information post-attack? Karen Barney of the Identity Theft Resource Center offers advice.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.