When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
In this week's breach roundup, read about the latest incidents, including Canadian voters' information that's missing and the online exposure of New York lawmakers' Social Security numbers.
RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.
Too many organizations that experience a data breach
fail to reveal information on the cause of the incident so that consumers can take appropriate action, one consumer advocacy group contends.
In this week's breach roundup, read about the latest incidents, including Anonymous stealing 2.4 million e-mails from Syria and social media site Formspring resetting all passwords after a breach.
Eight class action lawsuits filed in the wake of a 2011 data breach involving TRICARE, the military health program, and affecting nearly 5 million individuals have been consolidated into one case that will be handled by the U.S District Court in Washington, D.C.
A new guide has been released by the Information Commissioner's Office to help small and mid-sized businesses improve their IT security. Which threats should most concern them, and how can they use the guide?
In this week's breach roundup, read about the latest incidents, including a stolen, unencrypted hospital laptop and an Australian phone provider leaking information on hundreds of thousands of customers.
In this week's breach roundup, read about the latest incidents, including a phishing e-mail affecting U.S. Commodity Futures Trading Commission employees and a cruise line accidentally e-mailing sensitive passenger information.
The UK Information Commissioner's Office has released a new security guide for small and midsized businesses. Simon Rice of the ICO discusses the guide and how to use it to avoid being breached.
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.