Wednesday, October 21, 2009
A new white paper has been published to show how MSIT uses FCI in this MSIT Showcase Study http://vepcdn.microsoft.com/prod/images/64/Area/214/2676/9fd29bc1-bd16-42fe-a39e-f1d91d62aa60.pdf.
According to an article in http://darkreading.com, a Ford engineer allegedly stole 4,000 sensitive files by copying and downloading to a USB device before seeking employment with a Chinese competitor of Ford
Wednesday, August 26, 2009
Monday, July 27, 2009
Network Solutions hacked, 573,000 accounts compromised
According to an article in Washington Post, Network Solutions was hacked, and information from 573,000 accounts were accessed by the hackers. http://www.washingtonpost.com/wp-dyn/content/article/2009/07/24/AR2009072403527.html
According to an article in Washington Post, Network Solutions was hacked, and information from 573,000 accounts were accessed by the hackers. http://www.washingtonpost.com/wp-dyn/content/article/2009/07/24/AR2009072403527.html
Friday, July 17, 2009
Twitter found itself having business secrets exposed here: http://www.techcrunch.com/2009/07/16/twitters-internal-strategy-laid-bare-to-be-the-pulse-of-the-planet/ after a hack of a username and password. The information stolen includes strategic meeting minutes, personal information and more.
The breach at Lexis Nexis where PII was stolen, is linked to the Mafia according to this article from internetnews.com: http://www.internetnews.com/security/article.php/3829911/LexisNexis+Breach+Linked+to+Mafia.htm
Tuesday, July 07, 2009
According to this article in Washington Post, SSNs can be guessed easily using publicly known information: http://www.washingtonpost.com/wp-dyn/content/article/2009/07/06/AR2009070602955.html. It is also covered inhis article from Fast Company explaining how information users post on Facebook can be used to reverse engineer their SSN: http://www.fastcompany.com/blog/chris-dannen/techwatch/facebook-new-algorithm-can-guess-your-ssn
Tuesday, June 23, 2009
According to Principal AnalystForrester Research Chenxi Wang, Ph.D. Enterprises lack data leakage protection solutions for Web 2.0 applications. The answer is to deploy DLP and DRM technologies in the enterprise.
A new feature in Windows Server 2008 R2, is really interesting. It allows for tagging meta data to files stored in file shares, and allows for search, retention management, classification and protection. Information about File Classification Infrastructure in Server 2008: http://blogs.technet.com/filecab/archive/tags/File+Classification+Infrastructure+_2800_FCI_2900_/default.aspx
Monday, May 04, 2009
Tuesday, April 14, 2009
With RSA's new 7.0 release, they have improved their PII scanning capabilities along with reducing the overall TCO of maintaining their DLP solution: http://www.indiaprwire.com/pressrelease/information-technology/2009041423363.htm
Monday, March 23, 2009
Heartland reveals in their annual report that the data breach last year is currently under investigation by SEC, FTC, DOJ, Federal Financial Institutions Examination Council, and the Office of the Comptroller of the Currency. This is in addition to attorneys general of several states, and Canadian authorities.
This breach is going to be a costly affair for the company if the attrition numbers are continuing to grow. Even more costly will be the loss of sponsorship from their primary sponsor bank. Visa booted Heartland off of its list of processors compliant with the Payment Card Industry data-security standards, or PCI last week.
This breach is going to be a costly affair for the company if the attrition numbers are continuing to grow. Even more costly will be the loss of sponsorship from their primary sponsor bank. Visa booted Heartland off of its list of processors compliant with the Payment Card Industry data-security standards, or PCI last week.
Wednesday, March 11, 2009
California State Sen. Joe Simitian introduced new legislation to Expand Data Breach Notification Law
According to the magazine, Wired - March 06, 2009, California State Sen. Joe Simitian has introduced legislation that would require companies to provide more information in their data breach notification letters to consumers and to send notices to state authorities.
According to the magazine, Wired - March 06, 2009, California State Sen. Joe Simitian has introduced legislation that would require companies to provide more information in their data breach notification letters to consumers and to send notices to state authorities.
Tuesday, March 10, 2009
According to a study released by the Ponemon institute, 6 out of 10 US employees stole company data when they left their company according to this article in BBC NEWS: http://news.bbc.co.uk/2/hi/technology/7902989.stm
This is really a wake up call, to introduce digital rights management into the corporations to protect customer data, intellectual property and business secrets. Coupling Identity Management practices with DRM will ensure that sensitive information is adequatly protected even when walking out the door when the employee leaves.
This is really a wake up call, to introduce digital rights management into the corporations to protect customer data, intellectual property and business secrets. Coupling Identity Management practices with DRM will ensure that sensitive information is adequatly protected even when walking out the door when the employee leaves.
Monday, February 16, 2009
Three Florida men arrested for using stolen credit card information stemming from the Heartland breach. The value of attempted and actual fraud committed by these three alone exceeds $100,000:http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9127984&intsrc=hm_list
Subscribe to:
Posts (Atom)