Enhanced threat detection: The next (front) tier in security

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The cost of data breaches: Looking at the hard numbers

    Trying to determine the cost of a data breach is no easy task. After calculating the expenses of legal fees, call centers, lost employee productivity, regulatory fines, stock plummets and customer losses, it can be dizzying, if not impossible, to com... 

  • Public wireless networks present a raft of dangers

    A company's end-users don't always have the luxury of a protected network, as many often leave the comfort of their guarded corporate environment and access the Internet from coffee shops, hotels, airports and other public areas. In this tip, Mike Ch... 

  • Eight top information security events of 2006

    From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how t... 

  • IT compliance success doesn't equal security success

    While compliance needs may help boost an information security department's budget, using the compliance card to receive more funding can cause more harm than good. In this tip, contributor Khalid Kark, Senior Analyst at Forrester Research explains wh... 

  • Database compliance demystified

    As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, James C. Foster looks at specific regulations such as SO... 

  • RFID security issues endanger companies and consumers

    As the holiday season approaches, credit card purchases will undoubtedly increase. However, before waving your RFID-enabled credit card at the checkout of your favorite store, research suggests you may want to think twice. In this tip, Joel Dubin exa... 

  • Defensive measures for evolving phishing tactics

    From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive ... 

  • IT Infrastructure Library: Regulatory compliance benefits and training options

    The IT Infrastructure Library (ITIL) can assist organizations in their regulatory compliance efforts. This article explains how and outlines training options for security practitioners interested in becoming ITIL certified. 

  • Laptop crypto: Do it, but realize it's not a panacea

    Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy. 

  • Telecommuting security: Protecting sensitive data inside and out

    The rash of laptop thefts in recent months has brought telecommuting and remote access security to the forefront of many information security professionals' minds. In this tip, Joel Dubin examines the mistakes made in the VA data theft case and offer...