News
Privacy and data protection
-
May 03, 2007
03
May'07
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.
-
April 24, 2007
24
Apr'07
Apple fixes 25 Mac OS X flaws
Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.
-
April 11, 2007
11
Apr'07
Architectural firm swaps online data backup service providers
As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.
-
March 26, 2007
26
Mar'07
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management...
-
March 18, 2007
18
Mar'07
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.
-
March 18, 2007
18
Mar'07
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.
-
March 13, 2007
13
Mar'07
What are some best practices for retaining data in a highly regulated business environment?
Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long...
-
February 20, 2007
20
Feb'07
TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement.
-
February 13, 2007
13
Feb'07
Fortune 500 firm takes a crack at data classification
A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done.
-
February 05, 2007
05
Feb'07
Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...
-
February 05, 2007
05
Feb'07
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.
-
January 29, 2007
29
Jan'07
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.
-
January 28, 2007
28
Jan'07
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.
-
January 24, 2007
24
Jan'07
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.
-
January 17, 2007
17
Jan'07
Did TJX take the right steps after data breach?
Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner.
-
January 17, 2007
17
Jan'07
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.
-
December 13, 2006
13
Dec'06
Host-based replication
While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.
-
December 10, 2006
10
Dec'06
Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.
-
December 10, 2006
10
Dec'06
Messaging insecurity fuels data leakage fears
Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.
-
November 06, 2006
06
Nov'06
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.
-
August 30, 2006
30
Aug'06
Survey: Data breaches difficult to spot, prevent
IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches
-
August 30, 2006
30
Aug'06
Malware database access sparks debate
Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?
-
August 29, 2006
29
Aug'06
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.
-
August 24, 2006
24
Aug'06
What is the most important aspect of data protection when it comes to DR?
You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in ...
-
August 24, 2006
24
Aug'06
Aren't backups and archives essentially the same thing?
The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what ...
-
August 24, 2006
24
Aug'06
Cisco patches flaws in multiple products
Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products.
-
August 20, 2006
20
Aug'06
AOL data spill leads to dismissals, resignation
AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.
-
July 14, 2006
14
Jul'06
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning.
-
November 14, 2005
14
Nov'05
Hackers installing keyloggers at a record rate
iDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk.
-
November 10, 2005
10
Nov'05
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion ...
-
September 22, 2005
22
Sep'05
Who best to avert data security disaster: government or business?
People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us.
-
September 20, 2005
20
Sep'05
Insider threat seen as biggest data security issue
Whether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions.
-
August 26, 2005
26
Aug'05
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security.
-
August 10, 2005
10
Aug'05
Strategic Storage: Storage security -- Change old habits and stop data theft
-
July 21, 2005
21
Jul'05
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF).
-
February 24, 2005
24
Feb'05
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers.
-
January 10, 2005
10
Jan'05
Security Bytes: George Mason U. hacked; new Trojans on the loose
Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company.
-
May 16, 2004
16
May'04
Consequences of Cisco source code theft unclear
Opinions are divided on the impact of stolen data now circulating on the Internet.