Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Diaries by Keyword - SANS Internet Storm Center Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

DATA LOSS

2009-10-19Daniel WesemannBacked up, lately ?
2009-07-28Adrien de BeaupreYYAMCCBA
2009-04-24John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15Marcus Sachs2009 Data Breach Investigation Report
2008-08-25John BambenekThoughts on the Best Western Compromise

DATA

2016-09-22/a>Rick WannerYAHDD! (Yet another HUGE data Breach!)
2016-08-31/a>Deborah HaleDropbox Breach
2016-08-19/a>Xavier MertensData Classification For the Masses
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2016-06-20/a>Xavier MertensUsing Your Password Manager to Monitor Data Leaks
2016-02-22/a>Xavier MertensReducing False Positives with Open Data Sources
2016-01-30/a>Xavier MertensAll CVE Details at Your Fingertips
2015-09-01/a>Daniel WesemannEncryption of "data at rest" in servers
2015-07-31/a>Russ McReeTech tip: Invoke a system command in R
2015-07-31/a>Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-05-23/a>Guy BruneauBusiness Value in "Big Data"
2015-03-21/a>Russell EubanksHave you seen my personal information? It has been lost. Again.
2014-12-01/a>Guy BruneauDo you have a Data Breach Response Plan?
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2013-10-16/a>Adrien de BeaupreAccess denied and blacklists / blocklists
2013-07-06/a>Guy BruneauIs Metadata the Magic in Modern Network Security?
2012-12-03/a>John BambenekJohn McAfee Exposes His Location in Photo About His Being on Run
2012-11-30/a>Daniel WesemannSnipping Leaks
2012-11-22/a>Kevin ListonGreek National Arrested on Suspicion of Theft of 9M Records on Fellow Greeks
2012-01-16/a>Kevin ShorttZappos Breached
2011-04-20/a>Daniel WesemannData Breach Investigations Report published by Verizon
2011-01-12/a>Richard PorterHow Many Loyalty Cards do you Carry?
2011-01-12/a>Richard PorterYet Another Data Broker? AOL Lifestream.
2010-09-26/a>Daniel WesemannEgosurfing, the corporate way
2010-07-29/a>Rob VandenBrinkThe 2010 Verizon Data Breach Report is Out
2010-04-27/a>Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22/a>John BambenekData Redaction: You're Doing it Wrong
2010-02-10/a>Marcus SachsDatacenters and Directory Traversals
2009-10-19/a>Daniel WesemannBacked up, lately ?
2009-09-07/a>Lorna HutchesonEncrypting Data
2009-07-28/a>Adrien de BeaupreYYAMCCBA
2009-04-24/a>John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15/a>Marcus Sachs2009 Data Breach Investigation Report
2009-03-02/a>Swa FrantzenObama's leaked chopper blueprints: anything we can learn?
2009-01-30/a>Mark HofmanWe all "Love" USB drives
2008-12-17/a>donald smithTeam CYMRU's Malware Hash Registry
2008-08-25/a>John BambenekThoughts on the Best Western Compromise

LOSS

2009-10-19/a>Daniel WesemannBacked up, lately ?
2009-07-28/a>Adrien de BeaupreYYAMCCBA
2009-04-24/a>John BambenekData Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-15/a>Marcus Sachs2009 Data Breach Investigation Report
2008-08-25/a>John BambenekThoughts on the Best Western Compromise