Data Leakage Prevention

Processor affirms victim estimate, but warns of new breach

By

While Global Payments investigated the breach of its North American processing system, it turned up another intrusion, this one impacting merchants.

Lawsuits in Sutter Health breach to be rolled into one

By

Following the theft of a computer at Sutter Health in October that put the personal information of more than 4.2 million patients at risk, 11 class-action lawsuits were filed against the Sacramento, Calif.-based nonprofit.

Defining a DLP strategy

Defining a DLP strategy

DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.

Patient data at U of M hospital breached

By

A thief broke into a doctor's car and stole a briefcase containing a flash drive that held personal data on patients of University of Miami Miller School of Medicine.

'Tis the season for consumerization of IT

'Tis the season for consumerization of IT

With the holidays right around the corner, expect many workers to soon be returning from their breaks with shiny new personal devices, like an iPad, in hand -- and wanting to connect them to the corporate network. IT departments must have a response plan in place.

Sutter Health faces lawsuit after lost computer

By

The unencrypted data of 4.2 million Sutter Health patients went missing last month, and now the health care providers faces legal action.

Security spending to increase in 2012, survey shows

By

While the nation's economy remains in the tank, the information security market appears to be avoiding a major slowdown.

SC Congress New York: Security is about the basics, with a personal touch

By

Organizations must accept that they have been compromised by attackers and apply some personal craft to limit the damage, two security experts said during a panel Wednesday at SC Congress New York.

Best Data Leakage Prevention & Best Database Security Solution

By

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.

HTC confirms hole in its Android phones

By

HTC plans to release a patch after a "short" testing period, the company said Tuesday.

Can we stop hacktivism?

Can we stop hacktivism?

The answer is "no," but that doesn't mean security professionals are hopeless in defending their networks against politically minded intruders. Not to mention, you have more in common with them than you might think.

It's all about the data

It's all about the data

By

If we didn't care about who sees, damages or alters our data, we wouldn't need to waste millions of dollars on the tools of our trade, says Peter Stephenson, technology editor.

Sponsored video: Steve Livingston of Deloitte on risk

By

In a conversation with SC Magazine Executive Editor Dan Kaplan, Steve Livingston, principal of Deloitte Enterprise Risk Services, chronicles how people, processes and technology can combine to create a robust risk framework that achieves buy-in from senior management.

Virtualization guidelines issued to supplement PCI DSS 2.0

By

The PCI Security Standards Council on Tuesday released "PCI DSS Virtualization Guidelines" to update credit card payment security to the age of cloud computing.

Tax season: The IRS is the least of your concerns

Tax season: The IRS is the least of your concerns

With the April 18 tax deadline looming, security isn't top-of-mind for the employees in your finance, audit and operations departments.

Post-WikiLeaks: Back to basics

Post-WikiLeaks: Back to basics

Dust off your company's risk assessment process and make sure it is up to date because this is where your approach to defending against a WikiLeaks type of threat is going to start.

Before tech, process and policy

Before tech, process and policy

Data leakage prevention (DLP) is garnering a lot of attention as a cure-all for risk management.

RSA Conference 2011: CISO panel expects innovation, offers advice

By

Tools that better classify data, provide deep-packet inspection and offer risk management for organizations migrating to the cloud are three solutions areas ready to make their mark in the security industry, predicted a panel of CISOs on Tuesday.

The WikiLeaks challenge: Remember the risks associated with third-party exposure

The WikiLeaks challenge: Remember the risks associated with third-party exposure

When guarding against data breaches, organizations must consider the security postures of their closest partners, such as law firms and cloud providers.

WikiLeaks-prompted assessments due this month

By

Federal departments and agencies that handle classified data are required by Jan. 28 to complete an assessment of the safety measures they have in place to protect national security information, an effort prompted by the leak of confidential U.S. documents by whistleblower site WikiLeaks.

Learning from Assange

Learning from Assange

It is important for organizations to consider the basics if they want to avoid the leakage of sensitive information.

How the WikiLeaks crisis could have been prevented

How the WikiLeaks crisis could have been prevented

Trusting no one may soon become the new mantra in IT security, given the leak of sensitive U.S. diplomatic cables.

WikiLeaks prompts U.S. government to assess security

By

The federal government is moving quickly to deploy new security measures in light of the leak of hundreds of thousands of classified U.S. documents by whistleblower site WikiLeaks.

Data protection and controls: Does format really matter?

Data protection and controls: Does format really matter?

Organizations must consider the entire lifecycle of data, even when in hardcopy form, when implementing a security strategy.

Delaware retirees' personal information posted on state website

By

The personal information of Delaware state retirees was included in a request for proposal that made its way onto the state's website for five days before it was discovered and removed.

Security budgets stable or increasing at financial firms

By

Drivers such as compliance and insider threats are helping to keep information security budgets at financial institutions alive and well, according to a new study.

Walking the tightrope: social media and data protection in the enterprise

Walking the tightrope: social media and data protection in the enterprise

Organizations may want to second-guess a more restrictive strategy on website access and settle on a more pragmatic approach.

Smartphone security policies: Interview with Eduard Goodman, CPO of Idenity Theft 911

SC Magazine reporter Angela Moscaritolo interviews Eduard Goodman, chief privacy officer of Identity Theft 911, who says businesses are slow to develop policies for mobile device use, and smartphones can be the cause of many breaches.

New SharePoint bug opens corporations to data loss risk

By

Microsoft has disclosed a zero-day vulnerability in SharePoint after a Swiss security firm released details about the threat, which can be leveraged to siphon sensitive data from business users.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US