Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Security Breach

RSS Feed   
Security Breach Reports
 
Anatomy of a Hack Webinar
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Establish Secure DevOps Practices Webinar
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Uniquely You: Why Biometric Verification is Key to Proving Digital Identity
sponsored by Onfido
WHITE PAPER: Businesses in every industry are moving to digital models. But as this opens up exciting possibilities, it creates a not-so-hidden risk: Identity fraud. In this white paper, learn how biometrics can help solve a complex part of identity verification.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Onfido

Aruba ESP With Zero Trust Security: Security for the Edge
sponsored by Aruba Networks
DATA SHEET: In this brief, learn how Aruba ESP with Zero Trust Security can help improve an organization’s overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Aruba Networks

PCI DSS Success: Archiving Compliance and Increasing Web Application Security
sponsored by Citrix
WHITE PAPER: This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences