Data security breaches

Get the latest information on enterprise security data breaches. Learn about data breach laws and regulations, best practices for data breach notification and response plans, the risks of exposed corporate data and personally identifiable information.

Data security breaches News

Data security breaches Get Started

Bring yourself up to speed with our introductory content

  • zero-day (computer)

    Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. Continue Reading

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading

  • 2 components of detection and threat intelligence platforms

    Deploying threat detection and intelligence platforms is one of the smartest ways to protect your organization's valuable assets. Make sure you know how to choose the best tool. Continue Reading

Evaluate Data security breaches Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Manage Data security breaches

Learn to apply best practices and optimize your operations.

Problem Solve Data security breaches Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close