Identity Theft and Data Security Breaches News
November 21, 2016
In its first move following the Blue Coat Systems merger, Symantec agreed to acquire identity protection firm LifeLock for $2.3 billion to bolster its consumer security business.
November 11, 2016
Adobe agreed to pay several states a total of $1 million and agreed to new compliance measures as part of a settlement over the company's 2013 data breach.
September 12, 2016
Cloud POS provider Lightspeed reports a 'security incident,' reminds customers to change passwords and developers to implement OAuth 2.0 for improved authentication.
August 15, 2016
Following an embarrassing data breach, the Democratic National Committee has formed a cybersecurity advisory board, but experts have questioned the pedigree of board members.
Identity Theft and Data Security Breaches Get Started
Bring yourself up to speed with our introductory content
Test your proficiency in privileged user management. Take this quiz to determine your ability to keep privileged access secure across your organization. Continue Reading
Ransomware, the latest malware threat with which information security professionals must grapple, is spreading, according to many authorities. This TechGuide explores the nature of the threat and the latest ransomware trends. But it does more than ... Continue Reading
Information security is the set of business processes that protects information assets from being compromised, replicated or destroyed, regardless of its format. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Identity Theft and Data Security Breaches Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Barclays now uses a biometric authentication system for phone banking customers, where 'voice prints' can replace passwords. Expert Michael Cobb explains the security risks. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss new information on the Yahoo data breach, including how counterfeit cookies may have been used by attackers. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the Yahoo breach and questions and criticism regarding the company's enterprise security practices. Continue Reading
Manage Identity Theft and Data Security Breaches
Learn to apply best practices and optimize your operations.
With the large number of password breaches happening, enterprises should look into new methods of protecting their resources. Expert Nick Lewis explains how to reduce user risk. Continue Reading
Every enterprise has cybersecurity blind spots that it fails to recognize and address. Sean Martin explains what they are and how they create more CISO challenges. Continue Reading
In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading
Problem Solve Identity Theft and Data Security Breaches Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Malicious or criminal attacks take a longer time to identify and contain, research shows, leading to a higher cost per breach. We look at the numbers. Continue Reading
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
HIPAA data breach reporting now uses an electronic Web portal, so what does this mean for covered entities? Expert Mike Chapple explains. Continue Reading