Quantcast
Channel: TeamSHATTER » User Rights
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

GAO: Federal Network Security Breaches Spike 650 Percent

Reports of network security incidents at federal agencies have soared 650 percent during the past half-decade, jeopardizing the confidentiality and integrity of sensitive government information,...

View Article



Image may be NSFW.
Clik here to view.

Stanford Hospital Points Finger At Contractor For Data Breach

Stanford Hospital & Clinics this week blamed a third party billing contractor for a data breach that exposed the personal data of some 20,000 patients. Stanford release a statement blaming the...

View Article

Image may be NSFW.
Clik here to view.

White House Issues ‘WikiLeaks’ Order to Secure Classified Data

More than a year after thousands of classified and sensitive U.S. government documents were leaked to the secret-spilling site WikiLeaks, the White House has issued an executive order designed to...

View Article

Image may be NSFW.
Clik here to view.

Thousands Of Patient Records At Risk Following Genentech Breach

Thousands of patients seeking medical treatment may be at risk of identity theft following a breach of systems belonging to the biotech firm Genentech, according to a letter sent to New Hampshire’s...

View Article

Image may be NSFW.
Clik here to view.

Palo Alto: Audit Finds Breach – Employee And Customer Information At Risk

The City of Palo Alto’s business operation had a significant security breach that left sensitive employee and customer information open to outside access, an investigation by the City Auditor’s Office...

View Article


Image may be NSFW.
Clik here to view.

Database Breach: Ministry of Labor and Welfare, 9 Million Records Compromised

Personal information of some 9 million Israelis (alive and deceased) has been stolen by a contractor working for the country’s Ministry of Labor and Welfare with the intent of selling it to the highest...

View Article

Image may be NSFW.
Clik here to view.

Database Logging Basics For The Secure DBA

Building a secure system requires employing multiple processes, tools and techniques. This post will take a look at how to properly configure a file-based logging process.  Logging is the process of...

View Article

Image may be NSFW.
Clik here to view.

Lawsuit: Former SunPower Employees Sued For Stealing Proprietary Information

A lawsuit filed in federal court in California offers another reminder of how malicious insiders pose an often-underestimated threat to corporate data and intellectual property. SunPower Corp., a...

View Article


Image may be NSFW.
Clik here to view.

You Can’t Protect What You Don’t Know About

It’s 2012. Do you know where your databases are? Most DBA’s will probably say “Sure, my ERP backend is the RAC cluster running on these servers over there, my currency trading Sybase backend is running...

View Article


Image may be NSFW.
Clik here to view.

Who Poses The Biggest Risk To Your Data Security?

Companies’ IT staffs often hold the keys to the castle. And that’s the problem. At many companies, the people in the IT department pose the biggest risks to data security. They can access nearly...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images