Email Alerts
-
Create a data breach response plan in 10 easy steps
Having a solid data breach response plan in place can make the threat of a security breach less intimidating. In this tip, learn 10 steps to take that will lead to an effective data breach response plan. Tip
-
data breach
A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable ... Definition
-
Man sentenced in pump and dump stock scam
Indian national receives 81 months and $2.4 million fine for fraud scheme Article
-
Former Societe Generale trader accused of stealing computer code
Ex-employee allegedly stole proprietary code from bank's high-frequency trading system. Article
-
Apache.org suffers attack, warns of password breach
Software foundation warns users to change passwords as targeted cross-site scripting, brute force attacks penetrate Apache servers. News
-
Stolen portable media device blamed in breach of 3.3 million
Educational Credit Management Corp. (ECMC), a major federal loan guarantor, blames a stolen portable media device for the data loss on approximately 3.3 million individuals. Article
-
TJX hacker gets 20 years in prison in Heartland case
A day after his sentencing in the TJX hacking case, Albert Gonzalez is sentenced to 20 years in prison for Heartland Article
-
Twenty-year prison sentence in TJX hacking case
Albert Gonzalez receives stiff sentence for hacking into TJX and other retailers and stealing millions of credit and debit cards Article
-
At RSA Conference, experts dismiss end-to-end encryption claims
Payment industry "buzz" term isn't really reality, say some industry experts at RSA Conference 2010. Article
-
Companies urged to share data breach information
Sharing breach data with law enforcement is necessary for fighting sophisticated online criminals, panelists say. Article
Security Management Strategies for the CIO