Blog Posts Tagged with "2011 Verizon Breach Report"

3750d420f6c2a9844b529978894dc0be

It’s Data Breach Report Season: Beware Of Partial Truths

April 01, 2012 Added by:Josh Shaul

At the end of the day, these reports are important. They provide much needed insight into at least some data breaches. But we have to accept that this isn't the U.S. Census. We must learn what we can from them without becoming hypnotized by the hype that can surround them...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Verizon Breach Report – Application Security Specific Highlights

March 28, 2012 Added by:Fergal Glynn

Eight-one percent of attacks utilized hacking. There was a stark difference between large and small organizations. SQL injection comes in 3rd after use of stolen logins and exploitation of backdoor or command and control channel. It is tied with dictionary attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Verizon 2011 Data Breach Investigation Report Summary

March 22, 2012 Added by:Headlines

"Mainline cybercriminals continued to automate and streamline their method du jour of high-volume, low-risk attacks against weaker targets. Much less frequent, but arguably more damaging, were continued attacks targeting trade secrets, classified information, and intellectual property..."

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Four Keys for Intellectual Property Protection

February 07, 2012 Added by:Jason Clark

Intellectual property includes product designs, secret formulas, and other trade knowledge. It's what organized cybercrime, state governments and hackers are all going after. Why? Mostly because of the value. One stolen manufacturing process can be worth millions...

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Notes on the 2011 Verizon Breach Report

October 07, 2011 Added by:PCI Guru

Breaches occur because organizations get sloppy and, even with defense in depth in their security, there are too many controls where execution consistency has dropped leaving gaping holes in the various levels of security. However, once addressed, attackers will find other ways in...

Comments  (1)