Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Data Breaches Reports
 
Eliminating Access Blind Spots
sponsored by RSA
WHITE PAPER: 63% of data breaches involve compromised identities, according to the 2017 Verizon DBIR. Uncover how to enhance your security posture with multi-factor authentication that can mitigate potential risks prior to them causing trouble.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Top Trends Impacting IAM
sponsored by Simeio
WEBCAST: Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.
Posted: 15 Sep 2017 | Premiered: Sep 14, 2017

Simeio

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Security and Trust: The Backbone of Doing Business Over the Internet
sponsored by Symantec Website Security Solutions
WHITE PAPER: Carefully managing consumers' sensitive information is an essential part of online transactions. This informative resource helps you learn how you can gain the trust of your customers and keep their valuable information safe.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Symantec Website Security Solutions

Time for an IAM Overhaul
sponsored by SearchSecurity.com
EBOOK: IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchSecurity.com

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

HID Global's ActivID® Authentication: Online Banking
sponsored by HID Global
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID Global

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement