Better Fraud Through Data
Andy Kemshall, technical director of SecurEnvoy, recently said that the X-Factor US database hack is not only the latest in a string of attacks on corporate servers to extract personal data, but furthermore suggests that cybercriminals are now building information profiles on people, rather than developing frauds around available credentials. [more]
Title: Mapping Identity Credential and Access Management to
Meet Inter-agency and Private Cloud Interoperability Challenges
Date: June 2, 2011
Time: 2pm ET/11am PT
Sponsored by: Intel
Registration is complimentary - Register now
Title: Social Media and New Communications Risks in the
Enterprise: Mitigating Data Loss Dangers
Sponsored by: Proofpoint, Inc.
Registration is complimentary - Watch On-Demand
2010/2011 Computer Crime and Security Survey
The longest-running project of its kind in the security industry
This comprehensive survey reports on information about targeted attacks, incident response and the impacts of both malicious and non-malicious insiders. It contains details about respondents’ security programs, including budgeting, policies implemented, tools used, satisfaction with security tools and budgets, degree of outsourcing, use of metrics and effects of compliance requirements.