tags: breach, security, data

Action executed in 0.000

Each Tag

breach, security, data

Common tags - number of posts

smart card (6), GIS (4), web (4), open (4), visualization (4), server (3), hack (3), information (3), technology (3), tracker (3), science (3), wrangle (3), csv (2), analysis (2), education (2), health (2), statistics (2), SSL (2), DC (2), privacy (2), hackathon (2), visualize (2), government (2), clean (2), API (2), local (1), messaging (1), Deloitte (1), bachelor (1), AD (1), democracy (1), Active Directory (1), structure (1), trend (1), collaborate (1), 18F (1), research (1), degree (1), injustice (1), https (1), gov (1), CSAIL (1), equality (1), geography (1), spreadsheet (1), op-ed (1), death (1), linked (1), climate (1), food (1), OpenLDAP (1), boundary (1), civics (1), Laura (1), LDAP (1), refine (1), repository (1), WhatsApp (1), mock (1), encryption (1), airport (1), humanitarian (1), computer (1), UMD (1), name (1), development (1), communication (1), protection (1), weather.gov (1), Virginia (1), risks (1), export (1), 538 (1), OSM (1), poverty (1), survey (1), book (1), transportation (1), religion (1), json (1), wordpress (1), vector (1), Java (1), Let's Encrypt (1), planning (1), CDC (1), inspection (1), think tank (1), day (1), volunteer (1), D3 (1), browser (1), partnership (1), demographics (1), address (1), share (1), policy (1), MIT (1), sustainability (1), economy (1), map (1), Linux (1), process (1), internet (1), application (1), open data (1), age (1),

Sub groups 2

Sub groups 1

security, smart card (5), security, server (2), data, information, visualization (2), internet, privacy, security (1), protection, security (1), application, risks, security, web (1), data, vector, visualization (1), analysis, book, data, science (1), data, open (1), economy, government, health, policy, research, security, technology, think tank (1), Laura, SSL, security (1), SSL, security, wordpress (1), Linux, security, smart card (1), 18F, API, csv, data, open (1), DC, data, day, open (1), OSM, boundary, data, export, map, wrangle (1), clean, data, wrangle (1), bachelor, data, degree, education, trend (1), D3, Deloitte, MIT, data, visualize (1), airport, op-ed, privacy, security (1), GIS, analysis, data, geography, humanitarian (1), data, food, health, inspection, open data (1), computer, information, security (1), communication, data, statistics, visualize (1), API, csv, data, open (1), data, religion, survey (1), address, data, gov (1), data, json, linked, weather.gov (1), Let's Encrypt, https, security, server, web (1), climate, data, equality, injustice, partnership, poverty, sustainability (1), Java, education, security, web (1), data, science, volunteer (1), WhatsApp, encryption, messaging, security (1), GIS, data (1), CDC, data, death, visualization (1), AD, Active Directory, LDAP, OpenLDAP, development, mock, security (1), data, government, local, planning (1), security, technology (1), DC, GIS, data, demographics, transportation (1), civics, data, democracy, hackathon, science, technology (1), clean, data, structure (1), data, refine, spreadsheet, wrangle (1), browser, security, web (1), CSAIL, UMD, collaborate, data, process, repository, share (1), 538, age, data, name, statistics (1), GIS, Virginia, data, hackathon (1)

●●●●●○○○

The most innovative and damaging hacks of 2015 | Network World

The most innovative and damaging hacks of 2015 The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.

url: http://www.networkworld.com/article/3018594/security/the-most-innovative-and-damaging-hacks-of-2015.html

type: article, format: blog

●●●●●○○○

DataLossDB

dataloss db logo DataLossDB was founded in 2015 and was the original data breach tracking project. DataLossDB's aim was to provide unbiased, high quality data regarding data loss and in doing so the goal was to accomplish the following...

url: http://datalossdb.org/

type: project, format: blog

●●●●●○○○

DataBraches.net

tags: security, breach, data
Office of Inadequate Security logo

This site began life in 2009 as a spinoff from PogoWasRight.org after the number of breaches in 2008 made me realize I needed a separate site just for breaches.

This site receives no funding or financial support and that’s the way I intend to keep it. If you like the site and find it valuable, drop me a note to let me know.

url: http://www.databreaches.net/

type: project, format: blog