Data loss News
September 08, 2017
News roundup: Researchers used the new BootStomp tool to uncover six vulnerabilities in Android bootloaders. Plus, a new wave of AWS S3 bucket data leaks strikes and more.
August 31, 2017
An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts.
August 04, 2017
Enterprises may see paying up as a quick path to ransomware recovery, but experts said there are many issues to consider when making that choice.
July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
Data loss Get Started
Bring yourself up to speed with our introductory content
McAfee Endpoint Threat Protection is an antimalware protection product that is designed to secure Windows systems against malware, data loss and other threats in standalone or networked environments. Continue Reading
It's essential IT and OT consider the other's expertise and point of view and work together toward the ultimate goal -- a secure, productive IIoT. Continue Reading
Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business. Continue Reading
Evaluate Data loss Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A unified network security platform can offer organizations significant savings by helping them to reduce outages and the number of security components being managed. Continue Reading
Spectrum Protect data backup software helps enterprises prevent disaster through various backup methods, and aids in recovery in the case of data loss. Continue Reading
No cloud platform is perfect; there is always a risk of an outage or data loss. Consider a multicloud model to ensure redundancy and backup. Continue Reading
Manage Data loss
Learn to apply best practices and optimize your operations.
The challenges encountered in deriving business benefits from big data are huge, but so are the rewards. Hadoop and related technologies are easing those challenges to the point where companies are willing to graduate from experimental to full-blown big data analytics deployments. Still, the march toward that goal can be long and arduous, and not just from a technological and architectural standpoint. Before taking the plunge, big data users, including data scientists, managers and evangelists, are faced with the sometimes monumental task of justifying big data's return on investment to business executives focused on competition, profit margins and allocation of funds. "For a lot of organizations like ours, big data has not yet become a core foundation of running the business," said Beata Puncevic, director of analytics, data engineering and data management at Blue Cross Blue Shield of Michigan. Yet, actionable insights gained from big data analytics can be indispensable in driving revenue, reducing costs and developing new products.
This handbook on big data analytics examines the trials and tribulations of big data users who are on the front lines, devising and implementing partial and full-blown applications. In the first feature, editor Craig Stedman interviews battle-tested IT and analytics warriors from Blue Cross, Macy's and Progressive Insurance who reveal the business challenges in justifying the worthiness of big data applications. In the second feature, Stedman explains how real-time big data analytics is helping companies like Comcast and eBay to move quickly on massive amounts of incoming information. And in the third feature, reporter Ed Burns spotlights the decisions at Neilsen and Nasdaq to run or not to run big data systems in the cloud.Continue Reading
When an important application goes down, you'd better have the right IT incident management processes and procedures in place to fix it. Continue Reading
The secure handling of mobile data -- and related information protection requirements from HIPAA -- leads to the need for examining a healthcare organization's storage technology. Continue Reading
Problem Solve Data loss Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading
The Ticketbleed bug in some F5 Networks products caused session IDs and uninitialized memory to leak. Expert Judith Myerson explains what a session ID is and how attackers use it. Continue Reading
With data increasingly held hostage, companies are learning the downside of encryption and cryptocurrency. As some organizations admit to paying ransoms, will the problem get worse? Continue Reading