News

Privacy and data protection

  • June 16, 2008 16 Jun'08

    Gary McKinnon broke into 73,000 US government computers, Lords told

    Self confessed British hacker Gary McKinnon, who is fighting extradition to the US, broke into more than 73,000 US government computers, including those of the US Army, Navy and Nasa, and deleted critical data, the House of Lords heard today.

  • December 11, 2007 11 Dec'07

    San adoption cuts costs and power

    Advanced storage driving datacentre area and energy consumption reduction

  • November 21, 2007 21 Nov'07

    Experts: Privacy and security officers living in silos

    To better deal with the data breach threat, industry experts say security and privacy officers must break out of their silos and work as a team.

  • October 21, 2007 21 Oct'07

    Tackling the backup and recovery challenges of tomorrow

    Your data backup and data recovery challenges never stop changing. In this videocast, an EMC executive and a storage analyst discuss the new approaches you'll need to solve tomorrow's backup and recovery challenges.

  • September 07, 2007 07 Sep'07

    Cybercriminals employ toolkits in rising numbers to steal data

    The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan.

  • September 06, 2007 06 Sep'07

    Data security breach at Pfizer affects thousands

    A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months.

  • August 16, 2007 16 Aug'07

    TJX profit takes hit over data breach

    TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.

  • August 09, 2007 09 Aug'07

    VeriSign employee data exposed in laptop theft

    Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.

  • July 31, 2007 31 Jul'07

    Attackers ultimately drive security market, analyst says

    The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal sensitive information.

  • June 01, 2007 01 Jun'07

    Springing leaks: Getting smart about data loss prevention

    Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined.

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.

  • May 03, 2007 03 May'07

    Quiz: Preventing data leaks

    A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

  • April 24, 2007 24 Apr'07

    Apple fixes 25 Mac OS X flaws

    Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.

  • April 11, 2007 11 Apr'07

    Architectural firm swaps online data backup service providers

    As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.

  • March 26, 2007 26 Mar'07

    What are some of the best practices for managing the growth of unstructured data?

    It starts with corporate policies around data management...

  • March 18, 2007 18 Mar'07

    Symantec: Data thieves thrive on zero-day flaws

    According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.

  • March 18, 2007 18 Mar'07

    Hacker techniques use Google to unearth sensitive data

    Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.

  • March 13, 2007 13 Mar'07

    What are some best practices for retaining data in a highly regulated business environment?

    Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long...

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 13, 2007 13 Feb'07

    Fortune 500 firm takes a crack at data classification

    A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done.

  • February 05, 2007 05 Feb'07

    Symantec chief: Consumer confidence in data protection is key to online growth

    In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...

  • February 05, 2007 05 Feb'07

    Gates touts secure access anywhere

    Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.

  • January 29, 2007 29 Jan'07

    TJX faces lawsuit over data breach

    A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.

  • January 28, 2007 28 Jan'07

    IBM improves data recovery process for TSM users

    Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.

  • January 24, 2007 24 Jan'07

    TJX data breach info used to make fraudulent purchases

    Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.

  • January 17, 2007 17 Jan'07

    Did TJX take the right steps after data breach?

    Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner.

  • January 17, 2007 17 Jan'07

    Data breach at TJX could affect millions

    Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.

  • December 13, 2006 13 Dec'06

    Host-based replication

    While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.

  • December 10, 2006 10 Dec'06

    Zantaz buys data classification partner Singlecast

    Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.

  • December 10, 2006 10 Dec'06

    Messaging insecurity fuels data leakage fears

    Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • August 30, 2006 30 Aug'06

    Survey: Data breaches difficult to spot, prevent

    IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches

  • August 30, 2006 30 Aug'06

    Malware database access sparks debate

    Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?

  • August 29, 2006 29 Aug'06

    AT&T breach affects 19,000 customers

    Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.

  • August 24, 2006 24 Aug'06

    What is the most important aspect of data protection when it comes to DR?

    You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in ...

  • August 24, 2006 24 Aug'06

    Aren't backups and archives essentially the same thing?

    The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what ...

  • August 24, 2006 24 Aug'06

    Cisco patches flaws in multiple products

    Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products.

  • August 20, 2006 20 Aug'06

    AOL data spill leads to dismissals, resignation

    AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.

CIO
Security
Networking
Data Center
Data Management
Close