Data breach

Results: 1224



#Item
41Insurance in the United States / Health insurance in the United States / Geography of Missouri / Health in the United States / Geography of the United States / Health maintenance organizations / Blue Cross and Blue Shield of Kansas City / Data breach / Blue Cross Blue Shield Association / Kansas / Anthem Inc. / Premera Blue Cross

FOR IMMEDIATE RELEASE August 8, 2016 For more information, contact: Bob Hanson Public Information Officer

Add to Reading List

Source URL: www.ksinsurance.org

Language: English - Date: 2016-08-08 10:57:58
42Security / Computer security / Cyberwarfare / Secure communication / Cybercrime / Computer network security / Data security / Data breach / Balabit / Threat / Insider threat / Cyber-attack

www.balabit.com Why do companies need User Behavior Analytics? "Only amateurs attack machines; professionals target people. And any solutions will have to target the people problem, not the math problem."1

Add to Reading List

Source URL: pages.balabit.com

Language: English - Date: 2016-08-13 13:21:12
43Computing / Cloud infrastructure / Computer network security / Computer security / Cloudera / Hadoop / Threat / Big data / Cloud computing / Analytics

Cloudwick One® OSAS Cloud and Data Center Cybersecurity OPEN SOURCE ADAPTIVE SECURITY (OSAS) In today’s world of one data breach after another, enterprises are faced with a hostile information security environment. It

Add to Reading List

Source URL: www.cloudwick.com

Language: English
44Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Computer security / SafeNet / Anthem medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE SECOND QUARTER RECAP

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
45Security / Secure communication / Prevention / Data security / Data breach / E-commerce / Identity theft / Computer security / SafeNet / Anthem medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE THIRD QUARTER RECAP

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
46Economy / Business / Financial services / Payment systems / Debit card / Credit card / Chargeback / Debits and credits / Dispute / Bank account / Debit / Cheque

Four Steps To Take If You Think Your Credit/Debit Card Data Was Hacked Here’s what you can do to protect yourself if you spot unauthorized charges. If your information was part of a breach, the most immediate risk is t

Add to Reading List

Source URL: www.documentdestruction.mobi

Language: English - Date: 2015-06-13 15:21:55
47Insurance in the United States / Health insurance in the United States / Geography of Missouri / Health in the United States / Geography of the United States / Health maintenance organizations / Blue Cross and Blue Shield of Kansas City / Data breach / Blue Cross Blue Shield Association / Kansas / Anthem Inc. / Premera Blue Cross

FOR IMMEDIATE RELEASE August 8, 2016 For more information, contact: Bob Hanson Public Information Officer

Add to Reading List

Source URL: www.insureks.org

Language: English - Date: 2016-08-08 10:57:58
48Security / Secure communication / Prevention / Data security / Data breach / Identity theft / SafeNet / Computer security / Personal Data Privacy and Security Act

FIRST QUARTER RECAPTOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
49Security / Government / Data security / Privacy / Identity documents / Secure communication / National security / United States Office of Personnel Management / Marc Rotenberg / Data breach / Katherine Archuleta / Personally identifiable information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the OFFICE OF PERSONNEL MANAGEMENT Notice of Submission for Approval: Information Collection; Questionnaire for Public Trust Positions (SF 85P) and Suppl

Add to Reading List

Source URL: epic.org

Language: English - Date: 2016-05-25 12:49:19
50Misconduct / Spamming / Crime / Computing / Cybercrime / Social engineering / Identity theft / Phishing / Computer virus / Computer security / Email spam / Email

THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
UPDATE