Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Data BreachesReports
 
Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

The identity perimeter
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Security Threat Report: 2010
sponsored by Sophos UK
ANALYST REPORT: The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
Posted: 25 May 2010 | Published: 25 May 2010

Sophos UK

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime
sponsored by SearchSecurity.com
EBOOK: As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
Posted: 01 Oct 2009 | Published: 31 Aug 2009

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement