News

added: januari 5, 2011

ITRC: Data Breaches in 2010

The Identity Theft Resource Center recorded 662 breaches on its 2010 ITRC Breach List. It is apparent, with few exceptions, that there is no transparency when it comes to reporting breaches.

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: januari 3, 2011

2011: Focus on Insider Threats

Employees will continue to be major (insider) threat in 2011. 40 percent of IT executives said they routinely send confidential information through personal email to eliminate the audit trail from management. Additionally, 25 percent admitted to sending proprietary files to their personal email accounts with the intent of using that information at their next place of employment.

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: december 21, 2010

ABN Amro digitally robbed without insider-help

Dutch bank ABN Amro has been digitally robbed. The robbery took place at the beginning of 2011 and resulted in the theft of EUR 5.6 million. The Dutch banking association claims that the robbery took place without insider-help, leaving the modus operandi unclear.

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: december 21, 2010

No more Twitter for Dutch Firemen

Dutch firemen located in the Flevoland-region are forbidden to Twitter during their shifts. The measure was taken by the department’s commander after photographs of a deadly accident were published on Twitter by a fireman. The commander called social media platfoms as Twitter and YouTube a new form of “digital exhibitionism”.

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: december 16, 2010

WikiLeaks’ events analysed

We have seen three major incidents, each of which has important implications for information security. The first incident was the leakage of sensitive documents from the systems of the US Department of State. The second incident was the interruption of domain name and cloud services for the Wikileaks website. The third incident was the hacktivist attacks both against, and in support of Wikileaks. A hacker called Jester mounted a denial of service (DoS) attack against the Wikileaks website.

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Panels

Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


Publications

News and analyses on Human Factors & Awareness


Upcoming events

No events