Data security breaches
Get the latest information on enterprise security data breaches. Learn about data breach laws and regulations, best practices for data breach notification and response plans, the risks of exposed corporate data and personally identifiable information.
New & Notable
Data security breaches News
-
January 06, 2021
06
Jan'21
The SolarWinds attacks: What we know so far
The SolarWinds attacks have left a massive impact on security, tech and the world at large, and events are still unfolding nearly a month after the initial disclosure.
-
September 30, 2020
30
Sep'20
Attack on Universal Health Services a cry for change
A suspected ransomware attack on Universal Health Services is an existential crisis for healthcare organizations that needs to be addressed, according to one security expert.
-
September 24, 2020
24
Sep'20
Shopify discloses data breach caused by insider threats
Canadian e-commerce company Shopify disclosed a data breach involving two insider threats, but questions remain about the breach and how it was discovered.
-
September 17, 2020
17
Sep'20
Gartner: Paying after ransomware attacks carries big risks
The average cost of a ransomware payment in Q1 2020 was $178,254, according to a session at Gartner's Security & Risk Management Summit -- and that doesn't include downtime cost.
Data security breaches Get Started
Bring yourself up to speed with our introductory content
-
Data breach response: How to plan and recover
Download a planning guide from CompTIA to ensure your company and your customers are prepared and can respond when a ransomware attack or data breach strikes. Continue Reading
-
zero-day (computer)
Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. Continue Reading
-
identity theft
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Evaluate Data security breaches Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Security automation tools and analytics reshape SecOps efforts
To transition from being reactive to proactive in terms of cybersecurity threats, check out how SecOps teams can use security analytics and automation tools to make the change. Continue Reading
-
Security team analyzes data breach costs for better metrics
Security researchers discuss their findings on misleading and incorrect data breach cost metrics and share how breach reporting and information sharing can help all organizations. Continue Reading
-
The case for cybersecurity by design in application software
Security must be part of IT from the start and then continue through the entire product lifecycle -- design, build, release and maintenance. Consumers now demand it. Continue Reading
Manage Data security breaches
Learn to apply best practices and optimize your operations.
-
15 benefits of outsourcing your cybersecurity operations
For companies battling increasing security breaches and cyber attacks, MSSPs can offer reliability, continuity, nonstop coverage, broader experience and better access to talent. Continue Reading
-
8 benefits of a security operations center
A security operations center can help lessen the fallout of a data breach, but its business benefits go much further than that. Here are eight SOC benefits to consider. Continue Reading
-
How to implement a strong COVID-19 cybersecurity plan
Cybercriminals aren't slowing down during the coronavirus pandemic, and neither can your security. Learn what are the biggest threats and how to stop them cold. Continue Reading
Problem Solve Data security breaches Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
What are the biggest hardware security threats?
Hardware security threats -- and strategies to overcome them -- are evolving as enterprises increasingly install autonomous capabilities for smart building and IoT projects. Continue Reading
-
Addressing the expanding threat attack surface from COVID-19
CISOs need to ensure they and their security teams are aware of the new threats created by many businesses expanding their attack surface with many employees still working remotely. Continue Reading
-
Security pros explain how to prevent cyber attacks
Even during pandemics, hackers use malware such as ransomware and phishing to exploit an organization's vulnerabilities. IT security pros discuss how they prevent cyber attacks. Continue Reading