Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Data BreachesReports
 
ID Solution for Enterprise Trusted Anytime, Anywhere Access to and from Mobile Devices
sponsored by HID
BROCHURE: This brochure explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token.
Posted: 18 Aug 2014 | Published: 20 Feb 2013

HID

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

The identity perimeter
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assessĀ  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Solving the Weakest Link in Network Security: Passwords
sponsored by DigitalPersona
WHITE PAPER: This paper proposes improving security and authentication by using biometrics. Included are real stories demonstrating how this approach solves the password management nightmare, addresses compliance regulations and eliminates password costs.
Posted: 15 May 2007 | Published: 01 May 2007

DigitalPersona

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Institutional Identity Theft: How the Identity Theft of Your Customers Leads to the Erosion of Your Company's Profits and Good Name
sponsored by Perimeter eSecurity
WHITE PAPER: Read this whitepaper for a look at the real losses sustained by organizations whose customers experience identity theft and best policies, procedures, and solutions to reduce your organizations risk.
Posted: 04 Dec 2008 | Published: 04 Dec 2008

Perimeter eSecurity

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor

E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK: SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Gemalto
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement