Privacy and data protection
-
News
15 May 2025
NHS asks suppliers to sign up to cyber covenant
NHS digital and security leaders call on their suppliers to commit to a new cyber security charter as the health service works to improve its resilience in the face of growing threat levels. Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
14 May 2025
It's time to get to grips with DORA
It's not really a surprise so many organisations missed the EU's DORE compliance deadline, but there's no excuse for delaying, says Azul EMEA VP James Johnston Continue Reading
-
News
21 Oct 2007
Tackling the backup and recovery challenges of tomorrow
Your data backup and data recovery challenges never stop changing. In this videocast, an EMC executive and a storage analyst discuss the new approaches you'll need to solve tomorrow's backup and recovery challenges. Continue Reading
-
News
07 Sep 2007
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Continue Reading
By- Robert Westervelt, TechTarget
-
News
06 Sep 2007
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months. Continue Reading
By- SearchSecurity.com Staff
-
Feature
31 Aug 2007
User performs data storage U-turn
U-Store-It, a national self-storage company, decentralized its data centers, migrated data from SAN to DAS and de-clustered Exchange to simplify storage management. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Aug 2007
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
By- SearchSecurity.com Staff
-
News
09 Aug 2007
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee. Continue Reading
By -
News
31 Jul 2007
Attackers ultimately drive security market, analyst says
The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal sensitive information. Continue Reading
By- Robert Westervelt, TechTarget
-
News
01 Jun 2007
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Continue Reading
By- Neil Roiter, TechTarget
-
News
11 May 2007
Cisco fixes fresh flaws in IOS
Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system. Continue Reading
By- SearchSecurity.com Staff
-
News
03 May 2007
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
-
News
03 May 2007
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
-
News
03 May 2007
Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
-
News
24 Apr 2007
Apple fixes 25 Mac OS X flaws
Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code. Continue Reading
By- SearchSecurity.com Staff
-
News
11 Apr 2007
Architectural firm swaps online data backup service providers
As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
29 Mar 2007
Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading
By- Senior News Writer Bill Brenner
-
News
26 Mar 2007
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management... Continue Reading
-
News
18 Mar 2007
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007. Continue Reading
By -
News
18 Mar 2007
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns. Continue Reading
By -
Feature
14 Mar 2007
LexisNexis fights crime with storage
The document search company is offering a new data forensics service staffed by former federal agents and powered by commodity NAS. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
13 Mar 2007
What are some best practices for retaining data in a highly regulated business environment?
Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long... Continue Reading
-
Feature
21 Feb 2007
Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading
-
News
20 Feb 2007
TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement. Continue Reading
-
News
13 Feb 2007
Fortune 500 firm takes a crack at data classification
A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done. Continue Reading
By- Jo Maitland, TechTarget
-
News
05 Feb 2007
Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its customers. Continue Reading
By- Rob Westervelt, News Editor
-
News
05 Feb 2007
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof. Continue Reading
By- Michael Mimoso, TechTarget
-
News
29 Jan 2007
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month. Continue Reading
By -
News
28 Jan 2007
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product. Continue Reading
By- Jo Maitland, TechTarget
-
News
24 Jan 2007
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts. Continue Reading
By- Robert Westervelt, TechTarget
-
News
17 Jan 2007
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
17 Jan 2007
TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
-
News
17 Jan 2007
Did TJX take the right steps after data breach?
Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner. Continue Reading
By- Bill Brenner and Robert Westervelt, SearchSecurity.com Staff
-
Feature
17 Jan 2007
TJX gets little sympathy from blogosphere
TJX is taken to task by security bloggers for waiting until after a massive data breach to take steps to bolster its security. Continue Reading
-
Feature
09 Jan 2007
Federal government pushes full-disk encryption
Businesses need to follow the federal government's lead in reducing data breaches by holding employees responsible and examining full-disk encryption (FDE) products. Continue Reading
-
News
13 Dec 2006
Host-based replication
While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy. Continue Reading
-
News
10 Dec 2006
Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
10 Dec 2006
Messaging insecurity fuels data leakage fears
Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted. Continue Reading
By -
News
06 Nov 2006
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed. Continue Reading
-
Feature
03 Oct 2006
School district expels outsourced backup, enrolls CDP
Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product. Continue Reading
By- Alex Barrett, News Director, Data Center Media Group
-
Feature
27 Sep 2006
On privacy laws, every state is one of confusion
It's getting increasingly difficult for US firms to comply with regulations . David A. Meunier feels that it's time to develop safeguards and processes for this ever-changing regulatory environment. Continue Reading
By- David A. Meunier
-
News
30 Aug 2006
Survey: Data breaches difficult to spot, prevent
IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches Continue Reading
By -
News
30 Aug 2006
Malware database access sparks debate
Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados? Continue Reading
By -
News
29 Aug 2006
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected. Continue Reading
By -
Feature
29 Aug 2006
Risk management: Data organization and impact analysis
This first article of the Insider Risk Management Guide explains how to data organization is the first step in implementing insider threat controls. Continue Reading
-
News
24 Aug 2006
What is the most important aspect of data protection when it comes to DR?
You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in place. Just because the vendor's glossy ad said that theproduct allows you to restore "virtually in seconds," I wouldn't necessarily take their word for it. Continue Reading
-
News
24 Aug 2006
Aren't backups and archives essentially the same thing?
The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what a backup is for and what an archive is for, that's when we really start seeing the distinction between the two. Continue Reading
-
News
24 Aug 2006
Cisco patches flaws in multiple products
Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products. Continue Reading
By -
News
20 Aug 2006
AOL data spill leads to dismissals, resignation
AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month. Continue Reading
By- SearchSecurity.com Staff
-
News
14 Jul 2006
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning. Continue Reading
By -
News
14 Nov 2005
Hackers installing keyloggers at a record rate
iDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk. Continue Reading
By -
News
10 Nov 2005
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion suffers a security breach. Continue Reading
By- SearchSecurity.com Staff
-
News
22 Sep 2005
Who best to avert data security disaster: government or business?
People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us. Continue Reading
By -
News
20 Sep 2005
Insider threat seen as biggest data security issue
Whether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions. Continue Reading
By -
News
26 Aug 2005
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
10 Aug 2005
Strategic Storage: Storage security -- Change old habits and stop data theft
By- Maxine Kincora, contributing writer
-
News
21 Jul 2005
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
24 Feb 2005
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers. Continue Reading
By- SearchSecurity.com Staff
-
News
10 Jan 2005
Security Bytes: George Mason U. hacked; new Trojans on the loose
Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company. Continue Reading
By- SearchSecurity.com Staff
-
News
16 May 2004
Consequences of Cisco source code theft unclear
Opinions are divided on the impact of stolen data now circulating on the Internet. Continue Reading
By