<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Breach</title> <atom:link href="https://www.iphere.com/tag/breach/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>In the big data breach era, the safety of your personal data is ultimately out of your hands</title><link>https://www.iphere.com/in-the-big-data-breach-era-the-safety-of-your-personal-data-is-ultimately-out-of-your-hands</link> <comments>https://www.iphere.com/in-the-big-data-breach-era-the-safety-of-your-personal-data-is-ultimately-out-of-your-hands#comments</comments> <pubDate>Sat, 22 Mar 2014 02:13:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Hands]]></category> <category><![CDATA[Personal]]></category> <category><![CDATA[Safety]]></category> <category><![CDATA[ultimately]]></category> <guid
isPermaLink="false">http://www.iphere.com/in-the-big-data-breach-era-the-safety-of-your-personal-data-is-ultimately-out-of-your-hands</guid> <description><![CDATA[Each time there’s a high-profile data breach, security experts exhort the same best practices: Create unique logins for every service you use, use complex passwords, vigilantly comb your credit card statements for anomalies. The advice is sound. Unfortunately, it obscures the fact that the safety of your personal information is ultimately in the hands of [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/in-the-big-data-breach-era-the-safety-of-your-personal-data-is-ultimately-out-of-your-hands/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Retailer data breach trend not likely to end soon</title><link>https://www.iphere.com/retailer-data-breach-trend-not-likely-to-end-soon</link> <comments>https://www.iphere.com/retailer-data-breach-trend-not-likely-to-end-soon#comments</comments> <pubDate>Tue, 28 Jan 2014 02:12:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA['Likely']]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Retailer]]></category> <category><![CDATA[Soon]]></category> <category><![CDATA[Trend]]></category> <guid
isPermaLink="false">http://www.iphere.com/retailer-data-breach-trend-not-likely-to-end-soon</guid> <description><![CDATA[Three major retail chains have recently admitted being victims of massive data breaches that compromised sensitive data from over 100 million customers. Sadly, though, Target, Nieman-Marcus, and Michael’s are just the beginning of a trend that isn’t likely to fade away any time soon. Verizon&#8217;s annual Data Breach Investigations Report (DBIR) from May of 2013 [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/retailer-data-breach-trend-not-likely-to-end-soon/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Target breach notifications are a perfect example of what not to do</title><link>https://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do</link> <comments>https://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do#comments</comments> <pubDate>Sat, 18 Jan 2014 08:14:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[Example]]></category> <category><![CDATA[notifications]]></category> <category><![CDATA[perfect]]></category> <category><![CDATA[Target]]></category> <guid
isPermaLink="false">http://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do</guid> <description><![CDATA[Hopefully your company will never be the victim of a massive data breach. If it is, though, and customer data is compromised, make sure you don’t follow Target’s lead when it comes to notifying customers. Target’s customer notification efforts are wrong on almost every level. Customers are conditioned to not click on links in email [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Facebook breach highlights data security&#8217;s &#8220;weakest link&#8221; syndrome</title><link>https://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome</link> <comments>https://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome#comments</comments> <pubDate>Wed, 26 Jun 2013 20:13:00 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Facebook]]></category> <category><![CDATA[Highlights]]></category> <category><![CDATA[link]]></category> <category><![CDATA[Security's]]></category> <category><![CDATA[syndrome]]></category> <category><![CDATA[weakest]]></category> <guid
isPermaLink="false">http://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome</guid> <description><![CDATA[Facebook recently disclosed that a system glitch resulted in the exposure of sensitive personal data from as many as six million users. The impact from this particular breach seems relatively inconsequential, but it’s a sign of a larger problem when it comes to protecting personal data on the Web. Let’s start with a little about [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/facebook-breach-highlights-data-securitys-weakest-link-syndrome/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Evernote Breach: What It Means To Enterprise IT</title><link>https://www.iphere.com/evernote-breach-what-it-means-to-enterprise-it</link> <comments>https://www.iphere.com/evernote-breach-what-it-means-to-enterprise-it#comments</comments> <pubDate>Mon, 04 Mar 2013 20:14:08 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Evernote]]></category> <category><![CDATA[Means]]></category> <guid
isPermaLink="false">http://www.iphere.com/evernote-breach-what-it-means-to-enterprise-it</guid> <description><![CDATA[By now, you have heard about the latest in SaaS security woes: Evernote. As a user of the service, I was notified of the breach on Saturday. Evernote&#8217;s systems were compromised to the extent that individuals were able to access user information, which included encrypted passwords. Unlike the LinkedIn breach, where the passwords were encrypted, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/evernote-breach-what-it-means-to-enterprise-it/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Bit9 Breach Boosts Calls For Attack Intel-Sharing Among Targeted Security Vendors</title><link>https://www.iphere.com/bit9-breach-boosts-calls-for-attack-intel-sharing-among-targeted-security-vendors</link> <comments>https://www.iphere.com/bit9-breach-boosts-calls-for-attack-intel-sharing-among-targeted-security-vendors#comments</comments> <pubDate>Wed, 13 Feb 2013 14:23:22 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Among]]></category> <category><![CDATA[Attack]]></category> <category><![CDATA[Bit9]]></category> <category><![CDATA[Boosts]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[Calls]]></category> <category><![CDATA[IntelSharing]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Targeted]]></category> <category><![CDATA[Vendors]]></category> <guid
isPermaLink="false">http://www.iphere.com/bit9-breach-boosts-calls-for-attack-intel-sharing-among-targeted-security-vendors</guid> <description><![CDATA[Bit9 is the latest victim in a series of high-profile security vendors that have been hit by targeted attacks that compromised their security technology, prompting calls for vendors to unite and share their attack information in order to better detect and protect against these attacks that ultimately affect their customers and the overall security infrastructure [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/bit9-breach-boosts-calls-for-attack-intel-sharing-among-targeted-security-vendors/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Verizon Launches Service Based On Data Breach Report Methodology</title><link>https://www.iphere.com/verizon-launches-service-based-on-data-breach-report-methodology</link> <comments>https://www.iphere.com/verizon-launches-service-based-on-data-breach-report-methodology#comments</comments> <pubDate>Mon, 27 Jun 2011 02:24:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Based]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Launches]]></category> <category><![CDATA[Methodology]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Service]]></category> <category><![CDATA[Verizon]]></category> <guid
isPermaLink="false">http://www.iphere.com/verizon-launches-service-based-on-data-breach-report-methodology</guid> <description><![CDATA[Verizon Business is offering an security incident analysis service based on the Verizon Incident Sharing framework (VerIS), the foundation of its highly regarded annual Data Breach Investigation Report (DBIR). The aim of the service is to generate metrics of an organization&#8217;s security incidents over time to discover the root causes of vulnerability and take preventive [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/verizon-launches-service-based-on-data-breach-report-methodology/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>U.S. Data Breach Costs Still Increasing, Ponemon Survey Reports</title><link>https://www.iphere.com/u-s-data-breach-costs-still-increasing-ponemon-survey-reports</link> <comments>https://www.iphere.com/u-s-data-breach-costs-still-increasing-ponemon-survey-reports#comments</comments> <pubDate>Wed, 09 Mar 2011 16:36:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[Costs]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Increasing]]></category> <category><![CDATA[Ponemon]]></category> <category><![CDATA[Reports]]></category> <category><![CDATA[Still]]></category> <category><![CDATA[Survey]]></category> <category><![CDATA[U.S.]]></category> <guid
isPermaLink="false">http://www.iphere.com/u-s-data-breach-costs-still-increasing-ponemon-survey-reports</guid> <description><![CDATA[The cost of U.S. data breaches continues to rise, according to a Ponemon Institute survey, reaching an average cost of $ 7.2 million in 2010, up 7 percent from $ 6.8 million the previous year. The cost has increased every year since the first was released in 2006. That broke down to $ 214 per [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/u-s-data-breach-costs-still-increasing-ponemon-survey-reports/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>