TITLE

Latest Breach Preventable, Expert Contends

PUB. DATE
December 2011
SOURCE
ISO & Agent Weekly;12/15/2011, Vol. 7 Issue 46, p27
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the perspectives of Gartner Group vice president and security analyst Avivah Litan on preventing data breach in the U.S. Litan believes that data security breaches can be prevented by incorporating more breach and fraud prevention methods. Moreover, it mentions that hackers used variety of methods to get card information from about 80,000 consumers.
ACCESSION #
72320249

 

Related Articles

  • Is the Target Breach a Tipping Point for Card Security? Crosman, Penny // American Banker;1/15/2014, Vol. 179 Issue 8, p10 

    The article discusses data security in the U.S. as of January 2014 from the perspective of industry observers and in light of the security breaches at three retail companies during the 2013 holiday shopping season. The article notes ESSA Bank president Gary Olson supports the chip-and-PIN...

  • Identity Theft Still A Growing Problem.  // Business Communications Review;May2007, Vol. 37 Issue 5, p6 

    The article discusses research that took place between 2003 and 2006 concerning identity theft. According to Gartner, identity theft has increased by more than 50 percent in that three year span, costing the average victim $3,257 in 2006, compared to $1,408 in 2005. Victims are also recovering...

  • Oil Firms Hit by Hackers From China, Report Says. HODGE, NATHAN; ENTOUS, ADAM; Gold, Russell // US-China Today;2/10/2011, p1 

    The article presents information on the findings of a report issued by cyber security firm McAfee Inc. According to the report, computer hackers who seems to be based in China have conducted a coordinated campaign against several major Western energy firms. The hacker took gigabytes of highly...

  • In Wake of Data Theft, Snapchat Finally Talks. Garth Sr., William // Chicago Citizen - South Suburban Edition;2/19/2014, Vol. 33 Issue 16, p4 

    The article offers information on the implementation of a secure version of the application by Snapchat Inc. due to the hackers collecting 4.6 million user names, and phone numbers. Topics discussed include chief executive officer (CEO) at Snapchat Inc., Evan Spiegel, breach occurred despite of...

  • Digital Defense Offers Remedy for Security Flaws that Enable Hackers to "Hijack the Cloud".  // Document News;2012, Vol. 30 Issue 2, p5 

    The article discusses the security control and cloud-based system challenges faced by organizations in the U.S. that may lead to operational disruptions by hackers. Security company Digital Defense Inc. (DDI) states that the failure was due to issues in implementing the Intelligent Platform...

  • The rise of cyber-crime families. Prince, Brian // eWeek;7/21/2008, Vol. 25 Issue 22, p16 

    The article offers information on the Cyber-crime organizations in the U.S. These group collaborate around a classic Mafia-style model. Research shows that the organization's computer threats have grown more sophisticated wherein individual hackers are replaced with a well-structured...

  • Backdoor Bedlam. Mimoso, Michael S. // Information Security;May2008, Vol. 11 Issue 4, p8 

    The article discusses backdoors in computer systems which are inserted by developers for support purposes but could present attackers with a cheaper means of malware distribution and system access. Some backdoors contain a hidden functionality or invisible parameters in web applications that are...

  • Shielding yourself against virtual bullets. Harrison, Stephen // NetworkWorld Asia;Sep/Oct2011, Vol. 8 Issue 3, p40 

    The article offers three tips for companies to prevent computer security breaches. These tips are protecting switches and routers from network flooding, investing in blackholing and sinkholing, and using clean pipe solutions. It notes that implementing security measures is important to combat...

  • These goofs will make your mistakes seem minor. Altom, Tim // Indianapolis Business Journal;12/22/2008, Vol. 29 Issue 43, p24 

    The article focuses on data related to hacking listed by Dataloss DB. It is indicated that 8 million records lost to hackers from Best Western in August 2008, 47 million lost to hackers in January 2007 from TJX Cos. Inc. and 40 million to hackers in 2005. Many more losses were because of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics