CINXE.COM
BreachExchange: by thread
<!-- SecLists-Message-Count: 176 --> <!-- MHonArc v2.6.19 --> <!DOCTYPE html> <html lang="en"> <head> <script async src="/site.js"></script> <link rel="alternate" type="application/rss+xml" title="RSS" href="https://seclists.org/rss/dataloss.rss"> <meta property="og:image" content="https://seclists.org/images/dataloss-img.png" /> <link rel="image_src" href="https://seclists.org/images/dataloss-img.png" /> <title>BreachExchange: by thread</title> <link rel="canonical" href="/dataloss/2014/q2/"> <meta name="viewport" content="width=device-width,initial-scale=1"> <meta name="theme-color" content="#2A0D45"> <link rel="preload" as="image" href="/images/sitelogo.png" imagesizes="168px" imagesrcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x"> <link rel="preload" as="image" href="/shared/images/nst-icons.svg"> <link rel="stylesheet" href="/shared/css/nst.css?v=2"> <script async src="/shared/js/nst.js?v=2"></script> <link rel="stylesheet" href="/shared/css/nst-foot.css?v=2" media="print" onload="this.media='all'"> <link rel="stylesheet" href="/site.css"> <!--Google Analytics Code--> <link rel="preload" href="https://www.google-analytics.com/analytics.js" as="script"> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-11009417-1', 'auto'); ga('send', 'pageview'); </script> <!--END Google Analytics Code--> <META NAME="ROBOTS" CONTENT="NOARCHIVE"> <link rel="shortcut icon" href="/shared/images/tiny-eyeicon.png" type="image/png"> </head> <body><div id="nst-wrapper"> <div id="menu"> <div class="blur"> <header id="nst-head"> <a id="menu-open" href="#menu" aria-label="Open menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#menu"> </a> <a id="menu-close" href="#" aria-label="Close menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#close"> </a> <a id="nst-logo" href="/" aria-label="Home page"> <img alt="Home page logo" srcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x" src="/images/sitelogo.png" onerror="this.onerror=null;this.srcset=this.src" height=90 width=168></a> <nav id="nst-gnav"> <a class="nlink" href="https://nmap.org/">Nmap.org</a> <a class="nlink" href="https://npcap.com/">Npcap.com</a> <a class="nlink" href="https://seclists.org/">Seclists.org</a> <a class="nlink" href="https://sectools.org">Sectools.org</a> <a class="nlink" href="https://insecure.org/">Insecure.org</a> </nav> <form class="nst-search" id="nst-head-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> </header> </div> </div> <main id="nst-content"> <a href="/dataloss/"><img src="/images/dataloss-logo.png" width="80" class="l-logo right" alt="dataloss logo"></a> <h2 class="l-title"><a href="http://seclists.org/dataloss/">BreachExchange</a>: by thread</h2> <ul class="inline"><li class="first"><a href="/rss/dataloss.rss"><img src="/images/feed-icon-16x16.png" width=16 height=16 alt="RSS icon">RSS Feed</a> <li><a href="https://www.riskbasedsecurity.com/mailing-lists/"><img src="/images/about-icon-16x16.png" width=16 height=16 alt="About icon">About List</a> <li><a href="/"><img src="/images/up-icon-16x16.png" width=16 height=16 alt="Up icon">All Lists</a> </ul> <div class="nav-prev"><a href="/cgi-bin/nav.cgi?from=dataloss%2F2014%2Fq2&goto=prev&view=thread"><img src="/images/left-icon-16x16.png" width=16 height=16 alt="Previous">Previous period</a></div> <div class="nav-next"><a href="/cgi-bin/nav.cgi?from=dataloss%2F2014%2Fq2&goto=next&view=thread">Next period<img src="/images/right-icon-16x16.png" width=16 height=16 alt="Next"></a></div> <form class="nst-search center" action="/search/dataloss"> <input class="nst-search-q" name="q" type="search" placeholder="List Archive Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <p> 176 messages <a href="#begin">starting</a> Apr 01 14 and <a href="#end">ending</a> Jun 30 14 <br> <a href="date.html">Date index</a> | Thread index | <a href="author.html">Author index</a> </p> <hr id="begin"> <ul class="thread"> <li><a name="0" href="0">Why employees are the biggest not-so-hidden threat to your business data</a> <em>Audrey McNeil (Apr 01)</em></li> <li><a name="1" href="1">Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors</a> <em>Audrey McNeil (Apr 01)</em></li> <li><a name="2" href="2">C-level execs need to rethink IT security</a> <em>Audrey McNeil (Apr 01)</em></li> <li><a name="3" href="3">Could One Cyber Threat Take Down Your Practice?</a> <em>Audrey McNeil (Apr 01)</em></li> <li><a name="4" href="4">Experts urge U.S. caution on additional cyber threat disclosures</a> <em>Audrey McNeil (Apr 01)</em></li> <li><a name="5" href="5">How do the FBI and Secret Service know your network has been breached before you do?</a> <em>Audrey McNeil (Apr 01)</em></li> <li><a name="6" href="6">One in five IT pros don't believe in security</a> <em>Audrey McNeil (Apr 08)</em></li> <li><a name="7" href="7">Cybercriminals' new target? Your medical records</a> <em>Audrey McNeil (Apr 08)</em></li> <li><a name="8" href="8">Be Careful Beating Up Target</a> <em>Audrey McNeil (Apr 08)</em></li> <li><a name="9" href="9">IT Managers Preparing For The 'ApocalXPe'</a> <em>Audrey McNeil (Apr 08)</em></li> <li><a name="10" href="10">Small Business Data Breach: Mitigating the Damage</a> <em>Audrey McNeil (Apr 08)</em></li> <li><a name="11" href="11">Flight Centre Travel Group Data Leaked After Attempted "Extortion"</a> <em>Audrey McNeil (Apr 14)</em></li> <li><a name="12" href="12">SQL Injection Leads To BigMoneyJobs.com Leak</a> <em>Audrey McNeil (Apr 14)</em></li> <li><a name="13" href="13">The Problem With Two-Factor Authentication</a> <em>Audrey McNeil (Apr 14)</em></li> <li><a name="14" href="14">NSA-RSA Ties Raise New Concerns</a> <em>Audrey McNeil (Apr 14)</em></li> <li><a name="15" href="15">Court Upholds FTC's Power to Sue Hacked Companies</a> <em>Audrey McNeil (Apr 14)</em></li> <li><a name="16" href="16">CIOs at the heart of tackling cyber vulnerabilities</a> <em>Audrey McNeil (Apr 14)</em></li> <li><a name="17" href="17">Lacie confesses to year-long data breach as hackers harvest customers' details</a> <em>Richard Forno (Apr 17)</em></li> <li><a name="18" href="18">Getting Serious about Information Sharing for Cybersecurity</a> <em>Jake (Apr 17)</em></li> <li><a name="19" href="19">Kentucky enacts HB-232, Security of Personal Information</a> <em>Ben (B.K.) DeLong (Apr 17)</em></li> <li><a name="20" href="20">Who Are Breach Disclosure Laws Meant to Protect? One Merchant Held up Notifications for More Than a Year at the Request of Federal Authorities</a> <em>Audrey McNeil (Apr 17)</em></li> <li><a name="21" href="21">Do Claims Resulting From a Data Breach Have Any Success in Court?</a> <em>Audrey McNeil (Apr 17)</em></li> <li><a name="22" href="22">IT systems left unsupported create risk of data breach, warns watchdog</a> <em>Audrey McNeil (Apr 17)</em></li> <li><a name="23" href="23">Want to lower your risk? Lower the ROI of hackers</a> <em>Audrey McNeil (Apr 17)</em></li> <li><a name="24" href="24">Energy companies need insurance cover for cyber attack 'time bomb'</a> <em>Audrey McNeil (Apr 18)</em></li> <li><a name="25" href="25">What Makes Hospitals Lose Data Breach Lawsuits? 3 Cases Provide Insight</a> <em>Audrey McNeil (Apr 18)</em></li> <li><a name="26" href="26">'Baby Teeth' In Infrastructure Cyber Security Framework</a> <em>Audrey McNeil (Apr 18)</em></li> <li><a name="27" href="27">Deciphering the Cybersecurity Framework</a> <em>Audrey McNeil (Apr 18)</em></li> <li><a name="28" href="28">Security Breaches Still a Major Issue for Businesses</a> <em>Audrey McNeil (Apr 18)</em></li> <li><a name="29" href="29">Zeus Malware: A Continuing Threat</a> <em>Audrey McNeil (Apr 18)</em></li> <li><a name="30" href="30">The Changing Face of Insurance Data Breach Risk</a> <em>Audrey McNeil (Apr 21)</em></li> <li><a name="31" href="31">How small tech firms can reduce cyber risk</a> <em>Audrey McNeil (Apr 21)</em></li> <li><a name="32" href="32">Study Finds No Evidence of Heartbleed Attacks Before the Bug Was Exposed</a> <em>Audrey McNeil (Apr 21)</em></li> <li><a name="33" href="33">Why You Need A Chief Information Security Officer</a> <em>Audrey McNeil (Apr 21)</em></li> <li><a name="34" href="34">Nullcrew Compromises 9 Sites Including Spokeo and University of Virginia</a> <em>Jake (Apr 21)</em></li> <li><a name="35" href="35">Why Your Employees Are the Single Biggest Threat to Your Company's Data</a> <em>Audrey McNeil (Apr 23)</em></li> <li><a name="36" href="36">Personal Data Thefts Jumped 7 Percent in 6 Months</a> <em>Audrey McNeil (Apr 23)</em></li> <li><a name="37" href="37">Winning strategies in cyber warfare</a> <em>Audrey McNeil (Apr 23)</em></li> <li><a name="38" href="38">SQL: The Hack Attack You'll Never See Coming</a> <em>Audrey McNeil (Apr 23)</em></li> <li><a name="39" href="39">Small and Midsize Businesses Hit Hard by Cyber Attacks</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="40" href="40">No one is sleeping well in the cybersecurity world</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="41" href="41">Compliance is no guarantee of security</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="42" href="42">Federal CIOs Moving Cybersecurity Beyond Compliance</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="43" href="43">IT security is national security -- but you're not alone</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="44" href="44">Stolen Passwords Used In Most Data Breaches</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="45" href="45">Cyber insurance protects against data breach damage</a> <em>Audrey McNeil (Apr 24)</em></li> <li><a name="46" href="46">Federal watchdog says SEC security issues put financial data at risk</a> <em>Audrey McNeil (Apr 28)</em></li> <li><a name="47" href="47">Should Retailers and Banks Tell You When You’ve Been Hacked?</a> <em>Audrey McNeil (Apr 28)</em></li> <li><a name="48" href="48">Your Internet security relies on a few volunteers</a> <em>Audrey McNeil (Apr 28)</em></li> <li><a name="49" href="49">HIPAA Breach Tally and Enforcement Grow</a> <em>Audrey McNeil (Apr 28)</em></li> <li><a name="50" href="50">Taking Down the Underground Economy</a> <em>Audrey McNeil (Apr 28)</em></li> <li><a name="51" href="51">SEC seeks data on cyber security policies at Wall Street firms</a> <em>Audrey McNeil (Apr 29)</em></li> <li><a name="52" href="52">Cybersecurity Drill: Lessons Learned</a> <em>Audrey McNeil (Apr 29)</em></li> <li><a name="53" href="53">Small business owners crucial to stopping Heartbleed, experts say</a> <em>Audrey McNeil (Apr 29)</em></li> <li><a name="54" href="54">Six infosec tips I learned from Game of Thrones</a> <em>Audrey McNeil (Apr 29)</em></li> <li><a name="55" href="55">The gathering storm: What to expect in the future of cybersecurity litigation</a> <em>Audrey McNeil (Apr 29)</em></li> <li><a name="56" href="56">Modern threats – What you need to know</a> <em>Audrey McNeil (May 01)</em></li> <li><a name="57" href="57">High-profile breaches throw a wrench into security policy management</a> <em>Audrey McNeil (May 01)</em></li> <li><a name="58" href="58">CEOs still don't get cyber security, study finds</a> <em>Audrey McNeil (May 01)</em></li> <li><a name="59" href="59">Wounds from cybertheft can take long to heal</a> <em>Audrey McNeil (May 01)</em></li> <li><a name="60" href="60">Securing Open Source Post-Heartbleed</a> <em>Audrey McNeil (May 01)</em></li> <li><a name="61" href="61">4 strategies to help CIOs prepare for cyberattacks</a> <em>Audrey McNeil (May 07)</em></li> <li><a name="62" href="62">InfoSec 2014: Cost Of Serious Security Breaches Almost Doubles In A Year</a> <em>Audrey McNeil (May 07)</em></li> <li><a name="63" href="63">Some Insider Threats Tough to Mitigate</a> <em>Audrey McNeil (May 07)</em></li> <li><a name="64" href="64">Why the NSA might not say anything about the next ‘Heartbleed’</a> <em>Audrey McNeil (May 07)</em></li> <li><a name="65" href="65">FBI issues warning, EHRs vulnerable to cyber attack, theft</a> <em>Audrey McNeil (May 07)</em></li> <li><a name="66" href="66">Treat cyberspace like a battlefield</a> <em>Audrey McNeil (May 08)</em></li> <li><a name="67" href="67">Sales drop as corporate data breaches rise</a> <em>Audrey McNeil (May 08)</em></li> <li><a name="68" href="68">Data Theft a Major Concern for Organizations</a> <em>Audrey McNeil (May 08)</em></li> <li><a name="69" href="69">Data breach alert: Small retailers are especially vulnerable</a> <em>Audrey McNeil (May 08)</em></li> <li><a name="70" href="70">Why you need to pay attention to how people use your systems</a> <em>Audrey McNeil (May 08)</em></li> <li><a name="71" href="71">Network Security: Don't Forget The Vending Machine</a> <em>Audrey McNeil (May 12)</em></li> <li><a name="72" href="72">CISOs anxious about possible data breaches, employees not so much</a> <em>Audrey McNeil (May 12)</em></li> <li><a name="73" href="73">Data Theft And Cybercrime: Four Ways To Protect Your Business</a> <em>Audrey McNeil (May 12)</em></li> <li><a name="74" href="74">11 reasons encryption is (almost) dead</a> <em>Audrey McNeil (May 12)</em></li> <li><a name="75" href="75">Six Lessons From The Target Security Debacle</a> <em>Audrey McNeil (May 12)</em></li> <li><a name="76" href="76">The Cyberwar Is Not Lost, But Battles Are</a> <em>Audrey McNeil (May 14)</em></li> <li><a name="77" href="77">Cyber-Attackers Have Advantages, but Enterprises Must Fight Back</a> <em>Audrey McNeil (May 14)</em></li> <li><a name="78" href="78">Dodging disaster: Cybersecurity and business continuity</a> <em>Audrey McNeil (May 14)</em></li> <li><a name="79" href="79">Did Target's CEO Need to Go?</a> <em>Audrey McNeil (May 14)</em></li> <li><a name="80" href="80">Beware the Russian cyber bear</a> <em>Audrey McNeil (May 14)</em></li> <li><a name="81" href="81">FTC Told to Disclose the Data Security Standards it Uses for Breach Enforcement</a> <em>Audrey McNeil (May 14)</em></li> <li><a name="82" href="82">Data Breach: ‘Persistence’ Gives Hackers the Upper Hand</a> <em>Audrey McNeil (May 15)</em></li> <li><a name="83" href="83">Innovative ways for CISOs to raise cyber security awareness</a> <em>Audrey McNeil (May 15)</em></li> <li><a name="84" href="84">Cost of Data Breaches Up 15%</a> <em>Audrey McNeil (May 15)</em></li> <li><a name="85" href="85">Another day, another breach</a> <em>Audrey McNeil (May 15)</em></li> <li><a name="86" href="86">25% of breaches go undetected for more than a day</a> <em>Audrey McNeil (May 15)</em></li> <li><a name="87" href="87">Data Center Security Lessons from Heartbleed and Target</a> <em>Audrey McNeil (May 16)</em></li> <li><a name="88" href="88">A New Approach to Endpoint Security: Think ‘Positive’</a> <em>Audrey McNeil (May 16)</em></li> <li><a name="89" href="89">How to thwart hackers with a cyber playbook</a> <em>Audrey McNeil (May 16)</em></li> <li><a name="90" href="90">OMB: Agencies Improving IT Security</a> <em>Audrey McNeil (May 16)</em></li> <li><a name="91" href="91">Orange data breach underlines need for encryption, say experts</a> <em>Audrey McNeil (May 16)</em></li> <li><a name="92" href="92">Big Data, national data breach standard among issues government may soon tackle</a> <em>Audrey McNeil (May 16)</em></li> <li><a name="93" href="93">Into The Breach: The Limits Of Data Security Technology</a> <em>Audrey McNeil (May 19)</em></li> <li><a name="94" href="94">Save money by managing IT risk</a> <em>Audrey McNeil (May 19)</em></li> <li><a name="95" href="95">How to optimize your security budget</a> <em>Audrey McNeil (May 19)</em></li> <li><a name="96" href="96">Incorporating Cyber Security into Business</a> <em>Audrey McNeil (May 19)</em></li> <li><a name="97" href="97">Heartbleed Was a Headache, But Far From Fatal</a> <em>Audrey McNeil (May 19)</em></li> <li><a name="98" href="98">Is Infosec Getting More Stressful?</a> <em>Audrey McNeil (May 19)</em></li> <li><a name="99" href="99">Beyond the Bottom Line: How Data Loss Affects Employees</a> <em>Audrey McNeil (May 21)</em></li> <li><a name="100" href="100">Snapchat Settlement Signals Greater FTC Scrutiny for Tech Start-Up Privacy Policies</a> <em>Audrey McNeil (May 21)</em></li> <li><a name="101" href="101">Want 'perfect' security? Then threat data must be shared</a> <em>Audrey McNeil (May 21)</em></li> <li><a name="102" href="102">Cyber experts warn Iranian hackers becoming more aggressive</a> <em>Audrey McNeil (May 21)</em></li> <li><a name="103" href="103">FBI plans cyber crime crackdown, arrests coming in weeks</a> <em>Audrey McNeil (May 21)</em></li> <li><a name="104" href="104">eBay Suffers Massive Security Breach, All Users Must Change Their Passwords</a> <em>Jake (May 21)</em></li> <li><a name="105" href="105">Retailers, including Nike, band together to battle cybercrimes</a> <em>Audrey McNeil (May 23)</em></li> <li><a name="106" href="106">Reining in out-of-control security alerts</a> <em>Audrey McNeil (May 23)</em></li> <li><a name="107" href="107">Cybercriminals now gearing towards deception-based attacks</a> <em>Audrey McNeil (May 23)</em></li> <li><a name="108" href="108">Back to Basics...</a> <em>Audrey McNeil (May 23)</em></li> <li><a name="109" href="109">100 lawyers in a room: Target case draws the suits to St. Paul</a> <em>Audrey McNeil (May 23)</em></li> <li><a name="110" href="110">Breach Response: Building a Better Strategy</a> <em>Audrey McNeil (May 23)</em></li> <li><a name="111" href="111">U.S. industry too complacent about cyber risks, say experts</a> <em>Audrey McNeil (May 27)</em></li> <li><a name="112" href="112">Employees steal data to make good impression in a new job</a> <em>Audrey McNeil (May 27)</em></li> <li><a name="113" href="113">What Every Small Business Should Know About BYOD</a> <em>Audrey McNeil (May 27)</em></li> <li><a name="114" href="114">Inside FBI's massive cybercrime bust</a> <em>Audrey McNeil (May 27)</em></li> <li><a name="115" href="115">Planning for the inevitable cyber breach</a> <em>Audrey McNeil (May 27)</em></li> <li><a name="116" href="116">Why Security & Profitability Go Hand-In-Hand</a> <em>Audrey McNeil (May 28)</em></li> <li><a name="117" href="117">Businesses risk data breaches due to 'confusion' over privileged users</a> <em>Audrey McNeil (May 28)</em></li> <li><a name="118" href="118">Shoring up cybersecurity tied to bottom-line losses</a> <em>Audrey McNeil (May 28)</em></li> <li><a name="119" href="119">Businesses need to wake up and smell the hackers</a> <em>Audrey McNeil (May 28)</em></li> <li><a name="120" href="120">DHS: Lack of cyber law caused 'unnecessary delays' in Heartbleed response</a> <em>Audrey McNeil (May 28)</em></li> <li><a name="121" href="121">eBay argued against stronger privacy breach penalties</a> <em>Audrey McNeil (May 28)</em></li> <li><a name="122" href="122">First Quarter 2014 Exposes 176 Million Records – Troubling Trend Of Larger, More Severe Data Breaches Continues</a> <em>Audrey McNeil (Jun 02)</em></li> <li><a name="123" href="123">Why Investors Just Don't Care About Data Breaches</a> <em>Audrey McNeil (Jun 02)</em></li> <li><a name="124" href="124">SMBs more worried about risk this year</a> <em>Audrey McNeil (Jun 02)</em></li> <li><a name="125" href="125">Cyber liability must have for businesses</a> <em>Audrey McNeil (Jun 02)</em></li> <li><a name="126" href="126">FBI Expects Number of Cyber Attacks ‘To Grow Exponentially’ in Coming Years</a> <em>Audrey McNeil (Jun 02)</em></li> <li><a name="127" href="127">New Study Reveals Risks of Third-Party Vendors to IT</a> <em>Audrey McNeil (Jun 02)</em></li> <li><a name="128" href="128">Increasing Data Breach Costs Should Lead to a Review of Insurance Policies and Vendor Contracts</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="129" href="129">Look, pal, it’s YOUR password so it’s YOUR fault that it's gone AWOL</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="130" href="130">Going to war on the IT security battlefield</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="131" href="131">Half of American adults hacked this year</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="132" href="132">Cybercrime is outwitting, outpacing security</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="133" href="133">Batten Down The Hatches, We’re Under (Cyber)Attack</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="134" href="134">Health IT security lags behind retail industry</a> <em>Audrey McNeil (Jun 04)</em></li> <li><a name="135" href="135">Top 10 data breach survival tips after eBay, Spotify and Office breaches</a> <em>Audrey McNeil (Jun 10)</em></li> <li><a name="136" href="136">Companies should already know how to protect data, FTC argues</a> <em>Audrey McNeil (Jun 10)</em></li> <li><a name="137" href="137">Time-lapse security nightmares</a> <em>Audrey McNeil (Jun 10)</em></li> <li><a name="138" href="138">Data breach burnout – the biggest threat of all?</a> <em>Audrey McNeil (Jun 10)</em></li> <li><a name="139" href="139">The Five Tough Truths Of Cybersecurity Software</a> <em>Audrey McNeil (Jun 10)</em></li> <li><a name="140" href="140">Data Security: Keep A Lid On It</a> <em>Audrey McNeil (Jun 12)</em></li> <li><a name="141" href="141">A single solution for retail breaches?</a> <em>Audrey McNeil (Jun 12)</em></li> <li><a name="142" href="142">Exposure of confidential data via e-mail a very real risk for businesses</a> <em>Audrey McNeil (Jun 12)</em></li> <li><a name="143" href="143">"Groundhog Day" for data breaches</a> <em>Audrey McNeil (Jun 12)</em></li> <li><a name="144" href="144">European retail data breaches largely hidden, SC Congress told</a> <em>Audrey McNeil (Jun 12)</em></li> <li><a name="145" href="145">Paying the price to insure a company's reputation</a> <em>Audrey McNeil (Jun 12)</em></li> <li><a name="146" href="146">Identify stolen credentials to improve security intelligence</a> <em>Audrey McNeil (Jun 16)</em></li> <li><a name="147" href="147">Are you prepared to manage a security incident?</a> <em>Audrey McNeil (Jun 16)</em></li> <li><a name="148" href="148">Mitigating common healthcare cloud IT security issues</a> <em>Audrey McNeil (Jun 16)</em></li> <li><a name="149" href="149">UK Pitches Business 'Cyber Essentials'</a> <em>Audrey McNeil (Jun 16)</em></li> <li><a name="150" href="150">Cybercrime cuts deep in global economy</a> <em>Audrey McNeil (Jun 16)</em></li> <li><a name="151" href="151">Five Questions Every CEO Should Ask Their CIO / CISO</a> <em>Audrey McNeil (Jun 16)</em></li> <li><a name="152" href="152">Major medical records breaches pass 1, 000 milestone as enforcement ramps up</a> <em>Audrey McNeil (Jun 23)</em></li> <li><a name="153" href="153">Security Breaches Take Hours to Detect, Weeks to Neutralize: Report</a> <em>Audrey McNeil (Jun 23)</em></li> <li><a name="154" href="154">9 rules to follow after you've suffered a data breach</a> <em>Audrey McNeil (Jun 23)</em></li> <li><a name="155" href="155">The Evolution of Data Breach Threats</a> <em>Audrey McNeil (Jun 23)</em></li> <li><a name="156" href="156">Preventing Breaches: Don't Forget Paper</a> <em>Audrey McNeil (Jun 23)</em></li> <li><a name="157" href="157">Security Needs Evolve as Computing Leaves the Office</a> <em>Audrey McNeil (Jun 23)</em></li> <li><a name="158" href="158">AT&T Insider Data Breach More Dangerous Than External Hacking</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="159" href="159">New role of the CISO: Putting risk front and center</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="160" href="160">Why Security Should Be Top of Mind When Creating a Business</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="161" href="161">The Underground Economy of Data Breaches</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="162" href="162">10 Key Findings from HHS' Latest Data Breach Report</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="163" href="163">Lawyers need put cyber security policies in place</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="164" href="164">Data Breaches Equal Job Loss</a> <em>Audrey McNeil (Jun 25)</em></li> <li><a name="165" href="165">What scares security officers the most</a> <em>Audrey McNeil (Jun 26)</em></li> <li><a name="166" href="166">Credit Unions Need to be More Proactive in Cyber Security</a> <em>Audrey McNeil (Jun 26)</em></li> <li><a name="167" href="167">Anatomy of a Hotel Data Breach</a> <em>Audrey McNeil (Jun 26)</em></li> <li><a name="168" href="168">Breach response tips from experts</a> <em>Audrey McNeil (Jun 26)</em></li> <li><a name="169" href="169">Maybe it really does matter who the CISO reports to</a> <em>Audrey McNeil (Jun 26)</em></li> <li><a name="170" href="170">Security Awareness Training Missing in Midsize Companies</a> <em>Audrey McNeil (Jun 30)</em></li> <li><a name="171" href="171">ka-CHING! Cyber crime notification costs a lot</a> <em>Audrey McNeil (Jun 30)</em></li> <li><a name="172" href="172">Hacker Tactic: Holding Data Hostage</a> <em>Audrey McNeil (Jun 30)</em></li> <li><a name="173" href="173">Lawyers: Defendants concede too fast in data breach suits</a> <em>Audrey McNeil (Jun 30)</em></li> <li><a name="174" href="174">Despite data breaches, data security remains a low priority for many companies</a> <em>Audrey McNeil (Jun 30)</em></li> <li><a name="175" href="175">Are CISOs too confident?</a> <em>Audrey McNeil (Jun 30)</em></li> </ul> <hr id="end"> <div class="nav-prev"><a href="/cgi-bin/nav.cgi?from=dataloss%2F2014%2Fq2&goto=prev&view=thread"><img src="/images/left-icon-16x16.png" width=16 height=16 alt="Previous">Previous period</a></div> <div class="nav-next"><a href="/cgi-bin/nav.cgi?from=dataloss%2F2014%2Fq2&goto=next&view=thread">Next period<img src="/images/right-icon-16x16.png" width=16 height=16 alt="Next"></a></div> </main><!-- content --> <footer id="nst-foot"> <form class="nst-search" id="nst-foot-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <div class="flexlists"> <div class="fl-unit"> <h2><a class="nlink" href="https://nmap.org/">Nmap Security Scanner</a></h2> <ul> <li><a class="nlink" href="https://nmap.org/book/man.html">Ref Guide</a> <li><a class="nlink" href="https://nmap.org/book/install.html">Install Guide</a> <li><a class="nlink" href="https://nmap.org/docs.html">Docs</a> <li><a class="nlink" href="https://nmap.org/download.html">Download</a> <li><a class="nlink" href="https://nmap.org/oem/">Nmap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://npcap.com/">Npcap packet capture</a></h2> <ul> <li><a class="nlink" href="https://npcap.com/guide/">User's Guide</a> <li><a class="nlink" href="https://npcap.com/guide/npcap-devguide.html#npcap-api">API docs</a> <li><a class="nlink" href="https://npcap.com/#download">Download</a> <li><a class="nlink" href="https://npcap.com/oem/">Npcap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://seclists.org/">Security Lists</a></h2> <ul> <li><a class="nlink" href="https://seclists.org/nmap-announce/">Nmap Announce</a> <li><a class="nlink" href="https://seclists.org/nmap-dev/">Nmap Dev</a> <li><a class="nlink" href="https://seclists.org/fulldisclosure/">Full Disclosure</a> <li><a class="nlink" href="https://seclists.org/oss-sec/">Open Source Security</a> <li><a class="nlink" href="https://seclists.org/dataloss/">BreachExchange</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://sectools.org">Security Tools</a></h2> <ul> <li><a class="nlink" href="https://sectools.org/tag/vuln-scanners/">Vuln scanners</a> <li><a class="nlink" href="https://sectools.org/tag/pass-audit/">Password audit</a> <li><a class="nlink" href="https://sectools.org/tag/web-scanners/">Web scanners</a> <li><a class="nlink" href="https://sectools.org/tag/wireless/">Wireless</a> <li><a class="nlink" href="https://sectools.org/tag/sploits/">Exploitation</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://insecure.org/">About</a></h2> <ul> <li><a class="nlink" href="https://insecure.org/fyodor/">About/Contact</a> <li><a class="nlink" href="https://insecure.org/privacy.html">Privacy</a> <li><a class="nlink" href="https://insecure.org/advertising.html">Advertising</a> <li><a class="nlink" href="https://nmap.org/npsl/">Nmap Public Source License</a> </ul> </div> <div class="fl-unit social-links"> <a class="nlink" href="https://twitter.com/nmap" title="Visit us on Twitter"> <img width="32" height="32" src="/shared/images/nst-icons.svg#twitter" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://facebook.com/nmap" title="Visit us on Facebook"> <img width="32" height="32" src="/shared/images/nst-icons.svg#facebook" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://github.com/nmap/" title="Visit us on Github"> <img width="32" height="32" src="/shared/images/nst-icons.svg#github" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://reddit.com/r/nmap/" title="Discuss Nmap on Reddit"> <img width="32" height="32" src="/shared/images/nst-icons.svg#reddit" alt="" aria-hidden="true"> </a> </div> </div> </footer> </div><!-- wrapper --> </body> </html> <!-- MHonArc v2.6.19 -->