Identity Theft and Data Security Breaches News
July 15, 2016
The EU-U.S. Privacy Shield framework takes effect, replacing Safe Harbor for transatlantic data flows; U.S. beefs up Cyber Command.
June 29, 2016
Nearly 10 million patient records have been posted for sale on a dark web market, putting the personally identifiable information of many at risk for abuse.
June 21, 2016
Computer maker Acer was hit by a customer data breach of its e-commerce website, leaving approximately 34,500 customers' contact and payment information exposed for about a year.
May 13, 2016
Roundup: Google experiences an insider data breach, but the data leakage is cleaned up by a conscientious benefits manager. Plus, the FDIC reports five 'major' incidents, and more.
Identity Theft and Data Security Breaches Get Started
Bring yourself up to speed with our introductory content
Every enterprise has cybersecurity blind spots that it fails to recognize and address. Sean Martin explains what they are and how they create more CISO challenges. Continue Reading
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
Medical identity theft is the illegal access and use of someone’s personally identifiable information to fraudulently obtain medical service, prescription drugs or medical insurance coverage. The types of information stolen can include name, social ... Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Identity Theft and Data Security Breaches Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cybersecurity blind spots based in risk and vulnerabilities can be difficult to spot and address. Sean Martin talks with security experts on how to overcome that challenge. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the recent Acer data breach and the questions it raises about the company's payment security practices. Continue Reading
A data breach notification policy is important to have, but deciding how to alert customers can be tough. Expert Mike Chapple explains some best practices. Continue Reading
Manage Identity Theft and Data Security Breaches
Learn to apply best practices and optimize your operations.
In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading
Expert Bill Hayes examines five technologies that can complement data loss prevention products and improve enterprise security. Continue Reading
HIPAA data breach reporting now uses an electronic Web portal, so what does this mean for covered entities? Expert Mike Chapple explains. Continue Reading
Problem Solve Identity Theft and Data Security Breaches Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Sony Pictures hack was a breach unlike others. John Dickson, principal at Denim Group, talked to SearchSecurity at RSA Conference 2015 about what enterprises should take from the attack. Continue Reading
Video: Sophos' Chester Wisniewski explains why targeted malware and the presence of Windows XP are the biggest threats to point-of-sale security. Continue Reading
Expert Mike Chapple says a key detail in the Target breach suggests that the Fortune 500 retailer likely wasn't PCI DSS compliant. Continue Reading