Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » data breach

Articles Tagged with ''data breach''

5 Tips to Strengthen Cybersecurity and Data Protection for 2015

March 1, 2015

Fortune 1000 companies are emphasizing new privacy initiatives this year, increasing annual privacy budgets to $3 billion in 2015. According to Linda McReynolds, a senior attorney at Marashlian & Donahue, LLC, the CommLaw Group, enterprises can be better positioned to weather unintended data breach emergencies by following these five tips.


Read More

Are You Prepared for 2015's Cyber Threats?

March 1, 2015

For data security, 2015 is predicted to be as bad or worse as 2014, as more sensitive and confidential information and transactions are moved to the digital space and become vulnerable to attack, according to The Ponemon Institute’s study 2014: A Year of Mega Breaches.


Read More

Breach Report Hits Record High in 2014

March 1, 2015

The number of data breaches tracked in 2014 hit a record high of 783, according to a report from the Identity Theft Resource Center, sponsored by IDT911. This represents a 27.5-percent increase over the number of breaches reported in 2013, and an increase of 18.3 percent over the previous high of 662 breaches tracked in 2010.


Read More

Balancing the First Amendment with Brand Reputation after Breaches

Brennan-2016-200px.jpg
Jerry J. Brennan
Mattice-2016-200px.jpg
Lynn Mattice
March 1, 2015

Over the last several years, it has become commonplace for the media to publish information based on electronic materials that have been removed or copied either by organizational insiders and/or external people or groups. The publication of this type of material has impacted individuals, public and private organizations and various government agencies. While it is important for a free society to have the benefits of a free press serving as one of the checks and balances to protect citizens from abusive practices, we may have reached a point where we should re-examine how this is practiced. Are our criminal and civil statues effective on these issues?


Read More

Staving Off the Next Generation of Data Breach

Using Techniques like Continuous Monitoring Can Help Keep Enterprises Aware
Jack Marsal
February 24, 2015
2014 was dubbed the Year of the Data Breach. It became impossible to grab a newspaper without seeing the word “breach” smeared across the front page.
Read More
Corporate entities and retailers are scrambling to shore up network security by addressing the primary vulnerability of network security: the login. Unique “behavioral” biometric may be the solution.

Are Login Credential Vulnerabilities the Root of Data Breaches?

Jeff Elliott
February 10, 2015
Staggering numbers from security experts suggest that over 95 percent of all corporations have experienced a data breach of some kind – many of which can go undetected for months or years.
Read More

Millions of Records Compromised After Anthem Data Breach

February 5, 2015

Anthem, Inc., the second top insurer in the U.S., has reported a data breach that could affect a large percentage of its 37.5 million customers, as well as employees and past customers. Early estimates report that this could be the largest data breach affecting a U.S.-based health insurer yet. 


Read More

Data Breach Directions: What to Do After an Attack

diane-2016-200.jpg
Diane Ritchey
February 1, 2015

In 2009, Heartland Payment Systems announced that it had suffered a devastating breach: 134 million credit cards were exposed through SQL Injection attacks used to install spyware on Heartland’s data systems. The company processes payments for debit, prepaid and credit cards, in addition to online payments and checks and payroll services.  


Read More

7 Ways to Secure Data on Employee Devices

Harjot Sidhu
January 27, 2015
News of massive hacking attacks that expose sensitive company data and compromise customer account information has businesses of all sizes taking a closer look at their data security practices.
Read More

New York AG Proposes ’Strongest’ Data Security Law in U.S.

January 15, 2015

New York Attorney General Eric Schneiderman proposed what he called “the strongest” data security law in the nation to combat an increase in the theft of personal information online.


Read More
Previous 1 2 … 91 92 93 94 95 96 97 98 99 … 109 110 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing