News
Privacy and data protection
-
April 13, 2011
13
Apr'11
Infosec 2011: Charity sector shows the way to balance budget and security
Tackling security project by project is an effective way of securing data on a limited budget, says Matt Holland, head of information security at children's charity NSPCC.
-
April 05, 2011
05
Apr'11
City of York falls foul of data protection act following printer mix-up
The City of York Council has fallen foul of the Data Protection Act after having accidentally disclosed personal data following a printer mix-up.
-
April 04, 2011
04
Apr'11
RSA discloses phishing-attack data breach details
RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time.
-
March 28, 2011
28
Mar'11
Businesses spend over £600k a week on data security abroad
Companies are spending up to £624,000 a week to secure their most sensitive business data abroad, a study has revealed.
-
March 23, 2011
23
Mar'11
Budget 2011: UK public worried spending cuts will impact data security
A large proportion of the UK public is worried that government spending cuts will have a negative effect on data security, a survey has revealed.
-
March 17, 2011
17
Mar'11
Ban threat looms for Blackberry services as India demand corporate data access
India could block Research in Motion (RIM) from 31 March 2011 after government officials expressed dissatisfaction with access to Blackberry services.
-
January 28, 2011
28
Jan'11
SMEs still lack data backup
Many small business lack data recovery plans, despite a recent uptake in cloud adoption, according to a survey.
-
January 26, 2011
26
Jan'11
Cybercriminals target data in transit
Cybercriminals are shifting away from basic "smash and grab" attacks targeting stored data to more complex methods of data harvesting in transit, security research reveals.
-
January 12, 2011
12
Jan'11
Government departments criticised over data sharing mistake
Three government agencies have been criticised over a data sharing mistake that led to the wrongful disclosure of a woman's personal and financial information.
-
June 16, 2008
16
Jun'08
Gary McKinnon broke into 73,000 US government computers, Lords told
Self confessed British hacker Gary McKinnon, who is fighting extradition to the US, broke into more than 73,000 US government computers, including those of the US Army, Navy and Nasa, and deleted critical data, the House of Lords heard today.
-
December 11, 2007
11
Dec'07
San adoption cuts costs and power
Advanced storage driving datacentre area and energy consumption reduction
-
November 21, 2007
21
Nov'07
Experts: Privacy and security officers living in silos
To better deal with the data breach threat, industry experts say security and privacy officers must break out of their silos and work as a team.
-
October 21, 2007
21
Oct'07
Tackling the backup and recovery challenges of tomorrow
Your data backup and data recovery challenges never stop changing. In this videocast, an EMC executive and a storage analyst discuss the new approaches you'll need to solve tomorrow's backup and recovery challenges.
-
September 07, 2007
07
Sep'07
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan.
-
September 06, 2007
06
Sep'07
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months.
-
August 16, 2007
16
Aug'07
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.
-
August 09, 2007
09
Aug'07
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.
-
July 31, 2007
31
Jul'07
Attackers ultimately drive security market, analyst says
The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal sensitive information.
-
June 01, 2007
01
Jun'07
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined.
-
May 11, 2007
11
May'07
Cisco fixes fresh flaws in IOS
Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.
-
May 03, 2007
03
May'07
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.
-
April 24, 2007
24
Apr'07
Apple fixes 25 Mac OS X flaws
Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.
-
April 11, 2007
11
Apr'07
Architectural firm swaps online data backup service providers
As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.
-
March 26, 2007
26
Mar'07
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management...
-
March 18, 2007
18
Mar'07
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.
-
March 18, 2007
18
Mar'07
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.
-
March 13, 2007
13
Mar'07
What are some best practices for retaining data in a highly regulated business environment?
Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long...
-
February 20, 2007
20
Feb'07
TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement.
-
February 13, 2007
13
Feb'07
Fortune 500 firm takes a crack at data classification
A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done.
-
February 05, 2007
05
Feb'07
Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...
-
February 05, 2007
05
Feb'07
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.
-
January 29, 2007
29
Jan'07
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.
-
January 28, 2007
28
Jan'07
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.
-
January 24, 2007
24
Jan'07
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.
-
January 17, 2007
17
Jan'07
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.
-
January 17, 2007
17
Jan'07
Did TJX take the right steps after data breach?
Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner.
-
December 13, 2006
13
Dec'06
Host-based replication
While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.
-
December 10, 2006
10
Dec'06
Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.
-
December 10, 2006
10
Dec'06
Messaging insecurity fuels data leakage fears
Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.
-
November 06, 2006
06
Nov'06
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.
-
August 30, 2006
30
Aug'06
Survey: Data breaches difficult to spot, prevent
IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches
-
August 30, 2006
30
Aug'06
Malware database access sparks debate
Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?
-
August 29, 2006
29
Aug'06
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.
-
August 24, 2006
24
Aug'06
What is the most important aspect of data protection when it comes to DR?
You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in ...
-
August 24, 2006
24
Aug'06
Aren't backups and archives essentially the same thing?
The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what ...
-
August 24, 2006
24
Aug'06
Cisco patches flaws in multiple products
Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products.
-
August 20, 2006
20
Aug'06
AOL data spill leads to dismissals, resignation
AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.
-
July 14, 2006
14
Jul'06
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning.