Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 20 by Kevin Riggins tagged data-leakage

So, how do the bad guys get your data out of your networks? Read on to find out.

Share It With Others!

This looks interesting. See how well you are alerting/stopping data leakage in your org.

Share It With Others!

Share It With Others!

Jack makes some good points about customer data, where it came from and where it is going.

Share It With Others!

A couple of laws are getting closer to possibly become federal laws. See inside for a bit more detail.

Share It With Others!

Share It With Others!

Share It With Others!

Even something as simple as a route you use for your daily run can be a data leakage issue.

Share It With Others!

Last year, for one of my Toastmasters speeches, I have a quick 7 minute speech about data loss. For that talk, I used the on-line data loss db to grab a few numbers a for a period of a week. During that time there were 8 or 9 incidents and several hundred thousand records lost. The majority of those incidents were caused not by malicious behavior, but by mistakes. That's what this article talks about too.

Share It With Others!

Be careful what information you are sharing in something as basic as email headers. That stuff can be used against you.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT