Enhanced threat detection: The next (front) tier in security

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • University data breach stats show more data losses

    With data losses mounting, universities are paying a big price for stolen information, according to a new report. A more proactive approach to security can mitigate the problem. 

  • bot worm

    A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that ... 

  • Black Hat: Targeted network security attacks beating forensics efforts

    Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings. 

  • Verizon data breach report 2010: Insider breaches on the rise

    The company's highly anticipated report, which this year combines Secret Service data to analyze nearly 900 individual data breach cases, shows an increase in breaches by insiders, while overall breaches may be on the decline due to market saturation... 

  • Mass. hospital deals with lost backup data files

    Third-party firm hired by the hospital to destroy its backup data can't confirm it carried out its services, leaving 800,000 people at risk to identity theft. 

  • Tokenization vs encryption: RSA touts tokens to reduce PCI DSS pain

    Payment industry executives and security experts are currently debating over the right way to preserve and protect credit card data. Merchants can choose between a variety of formats, from format preserving encryption, which replaces the 16-digit cre... 

  • Create a data breach response plan in 10 easy steps

    Having a solid data breach response plan in place can make the threat of a security breach less intimidating. In this tip, learn 10 steps to take that will lead to an effective data breach response plan. 

  • data breach

    A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable ... 

  • Man sentenced in pump and dump stock scam

    Indian national receives 81 months and $2.4 million fine for fraud scheme 

  • Former Societe Generale trader accused of stealing computer code

    Ex-employee allegedly stole proprietary code from bank's high-frequency trading system.