Searching all of TechTarget| 10,094 results for "breaches"

SearchSecurity

By Olivia L. Eckerson Dec 29, 2015

The futility of data breach notifications

Olivia Eckerson discusses how her healthcare insurance provider was hacked, and why the data breach notification letter she received was less than helpful. Continue Reading

ComputerWeekly

Dec 10, 2015

How to deal with the aftermath of a data breach

Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading

SearchNetworking

By Eamon McCarthy Earls News Jan 14, 2016

Patch offered for breach in Juniper firewalls

This week, a patch becomes available for Juniper firewalls, analysts parse IT employment statistics for 2015 and Aruba deploys 802.11ac for the U.S. Army. Continue Reading

ComputerWeekly

By Warwick Ashford Jan 08, 2016

Time Warner Cable denies breach

US telecoms firm believes passwords were stolen either through phishing attacks or data breaches at other companies that store its customer information Continue Reading

SearchCIO

By Harvey Koeppel ,Niel Nickolaisen ,Mary K. Pratt Manage Jan 26, 2016

Forming a DR/BC plan for the inevitable data breach

According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of ... Continue Reading

SearchSecurity

By Rob Wright News Nov 23, 2015

Lessons learned from the Adobe data breach

Adobe CSO Brad Arkin spoke at the recent Privacy. Security. Risk. 2015 event about his experiences dealing with the company's massive data breach two years ago. Continue Reading

SearchCIO

By Mary K. Pratt Evaluate Jan 08, 2016

Eight-step data breach plan for the IT organization

A data breach plan that addresses the many variations a hack can take should consider these eight points. Continue Reading

SearchCIO

By Mary K. Pratt Evaluate Jan 06, 2016

How to handle a data breach: Managing public perception

When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading

ComputerWeekly

By Warwick Ashford Oct 12, 2015

Data breach hits Dow Jones

Hackers may have accessed the payment card details of up to 3,500 customers, warns finance publisher Dow Jones Continue Reading

SearchSecurity

By Michael Heller News Dec 04, 2015

Alleged OPM breach hackers arrested by Chinese government

Hackers arrested by the Chinese government are allegedly the criminals behind the OPM breach, but experts want more evidence before trusting China. Continue Reading