Diaries by Keyword: data loss

DateAuthorTitle

DATA LOSS

2009-10-19Daniel WesemannBacked up, lately ?
2009-07-28Adrien de BeaupreYYAMCCBA
2009-04-24John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15Marcus Sachs2009 Data Breach Investigation Report
2008-08-25John BambenekThoughts on the Best Western Compromise

DATA

2014-02-04Johannes UllrichOdd ICMP Echo Request Payload
2013-10-16Adrien de BeaupreAccess denied and blacklists / blocklists
2013-07-06Guy BruneauIs Metadata the Magic in Modern Network Security?
2012-12-03John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-30Daniel WesemannSnipping Leaks
2012-11-22Kevin ListonGreek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-01-16Kevin ShorttZappos Breached
2011-04-20Daniel WesemannData Breach Investigations Report published by Verizon
2011-01-12Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12Richard PorterYet Another Data Broker? AOL Lifestream.
2010-09-26Daniel WesemannEgosurfing, the corporate way
2010-07-29Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-04-27Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22John BambenekData Redaction: You're Doing it Wrong
2010-02-10Marcus SachsDatacenters and Directory Traversals
2009-10-19Daniel WesemannBacked up, lately ?
2009-09-07Lorna HutchesonEncrypting Data
2009-07-28Adrien de BeaupreYYAMCCBA
2009-04-24John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15Marcus Sachs2009 Data Breach Investigation Report
2009-03-02Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-01-30Mark HofmanWe all "Love" USB drives
2008-12-17donald smithTeam CYMRU's Malware Hash Registry
2008-08-25John BambenekThoughts on the Best Western Compromise

LOSS

2009-10-19Daniel WesemannBacked up, lately ?
2009-07-28Adrien de BeaupreYYAMCCBA
2009-04-24John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15Marcus Sachs2009 Data Breach Investigation Report
2008-08-25John BambenekThoughts on the Best Western Compromise