Why CISOs must adopt a new mentality to protect data

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • PCI encryption requirements driving widespread adoption, survey finds

    Encryption has become generally accepted in the industry, said Larry Ponemon, founder of the Ponemon Institute LLC. 

  • privilege escalation attack

    A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. 

  • Privacy advocate explains why people should care about privacy

    An all out assult on privacy is taking place and some people are failing to see the problem, said Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario. 

  • Midmarket financial firms grapple with internal, external security threats

    Midmarket financial firms, struck hard by global economic concerns, are facing a challenging threat environment while trying to trim operational costs – a process that is putting further strain on IT security professionals. 

  • University data breach stats show more data losses

    With data losses mounting, universities are paying a big price for stolen information, according to a new report. A more proactive approach to security can mitigate the problem. 

  • bot worm

    A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that ... 

  • Black Hat: Targeted network security attacks beating forensics efforts

    Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings. 

  • Verizon data breach report 2010: Insider breaches on the rise

    The company's highly anticipated report, which this year combines Secret Service data to analyze nearly 900 individual data breach cases, shows an increase in breaches by insiders, while overall breaches may be on the decline due to market saturation... 

  • Mass. hospital deals with lost backup data files

    Third-party firm hired by the hospital to destroy its backup data can't confirm it carried out its services, leaving 800,000 people at risk to identity theft. 

  • Tokenization vs encryption: RSA touts tokens to reduce PCI DSS pain

    Payment industry executives and security experts are currently debating over the right way to preserve and protect credit card data. Merchants can choose between a variety of formats, from format preserving encryption, which replaces the 16-digit cre...