Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Theft

RSS Feed    Add to Google    Add to My Yahoo!
Data TheftReports
 
Top 5 Requirements for Today’s NGFW
sponsored by Fortinet, Inc.
VIDEO: Popular data breaches like those at eBay and Monsanto have led to an increasing desire among organizations to leverage next generation firewalls. This webinar explains the top drivers, features, and decision criteria for these firewalls.
Posted: 30 Jul 2014 | Premiered: 06 Jun 2014

Fortinet, Inc.

Safeguard your organization from Red Flags Rule non compliance
sponsored by Iron Mountain
WHITE PAPER: Since the Red Flags Rule took effect in 2011, there has been a lot of confusion over which businesses must comply and develop identity theft prevention programs. Is your business covered? This paper clearly defines which businesses are affected, explains the key aspects of the Red Flags Rule and more.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Making the FACTA Red Flags Rules Operational
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Access Accounts More Securely with Intel® Identity Protection Technology
sponsored by Intel
PRODUCT OVERVIEW: This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them.
Posted: 03 Aug 2011 | Published: 02 Aug 2011

Intel

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.

SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement