357 Lotus blogs updated hourly. Who will post next? Home | Downloads | Events | Pods | Blogs | Search | myPL | About 
 
Latest 7 Posts
The IT Professional vs. The Deadly Data Breach
Mon, Sep 15th 2014 73
You Have a Case of Identity Theft!
Mon, Aug 25th 2014 101
PayPal for Mobile: How Secure is Your PayPal Account?
Mon, Jul 21st 2014 1862
More Compromised Students and Faculty
Thu, Jul 17th 2014 153
Violated Database: Montana Department of Public Health and Human Services
Wed, Jul 16th 2014 199
Young Hacker Infiltrates High School Database
Wed, Jul 2nd 2014 225
Press Release: Get the Level of Identity Management Your Campus NEEDS for Office 365
Fri, Jun 27th 2014 213
Top 10
PayPal for Mobile: How Secure is Your PayPal Account?
Mon, Jul 21st 2014 1862
How to Mend a Broken Heart: The Heartbleed Bug and what you need to know to protect yourself
Fri, Apr 11th 2014 791
Data Breach on Campus: Over 300,000 Exposed at University of Maryland
Fri, Feb 21st 2014 385
Hackstorm
Wed, Feb 26th 2014 297
To E-File or Not to E-File
Mon, Feb 10th 2014 291
Price vs Cost: One Man’s Opinion
Mon, Mar 3rd 2014 280
From Hacktivist to Cybersleuth
Fri, Jun 20th 2014 276
Alarmingly Low Rate of Employees Receive Security Awareness Training
Wed, Apr 23rd 2014 274
World’s Largest Beverage Company Compromised
Thu, Jan 30th 2014 267
Honesty is the Best Policy: Passwords, IT Security Professionals, and Llamas!
Tue, Jun 3rd 2014 266


The Data Breach Blog – An Excellent Resource
Chief Content Writer    

We have been including blog posts related to security breaches throughout the year and I wanted to share with you a great resource from SCMagazine called The Data Breach Blog. This is a blog dedicated to reporting on various data breaches which have occurred and providing information such as how many victims, what happened, what type of personal data, what was the response, and details about issues which allowed the data breach to happen.

One example is this recent data breach of a database containing personal information from 235,000 students, former students, parents, faculty, staff and individuals who sent their SAT scores to Western Connecticut State University. This included names, social security numbers, emails, addresses, phone numbers and even grades.  Check out the rest of the blog post to see how they handled the attack….

###

The PortalGuard software is an authentication platform which is focused on enhancing usability, while maintaining a balance between security, auditing, and compliance for your web and desktop authentication requirements. PortalGuard provides capabilities including multi-factor authentication, transparent user authentication,  self-service password management, two-factor authentication, password synchronization and single sign-on which can be seamlessly configured by user, group, or application.

http://www.PortalGuard.com

Subscribe to our newsletter: http://portalguard.com/contact_us.php

https://twitter.com/portalguard

http://pinterest.com/pistolstar/portalguard

http://www.facebook.com/pistolstar.authentication

http://www.facebook.com/pages/PortalGuard/240761992635169



---------------------
http://blog.pistolstar.us/blog/the-data-breach-blog-an-excellent-resource/
Dec 12, 2012
67 hits



Recent Blog Posts
73


The IT Professional vs. The Deadly Data Breach
Mon, Sep 15th 2014 8:12a   Liana Lichtenwalner
The Deadly Data Breach We know it well, the Deadly Data Breach! So many people have felt the effects of a data breach, and so many companies are scrambling to protect the personal information they have on file. I am sure data breaches are on the minds of every IT professional that has kept up with the most recent breaches. No one goes unscathed by The Deadly Breach: P.F. Changs, Goodwill, Home Depot, and numerous schools. Home Depot’s recent data breach reaches all the way back to April first [read] Keywords: application applications password security
101


You Have a Case of Identity Theft!
Mon, Aug 25th 2014 10:11a   Liana Lichtenwalner
It’s the hot topic in the news, blogs, books, and more, identity theft and security! We are all susceptible to identity theft from the individual user to the largest corporation. Author Steve Weisman has been speaking on Identity Security for years, including his blog Scamicide and in his books The Truth About Avoiding Scams and Identity Theft Alert: 10 Rules You Must Follow. The most recent breach, the Community Heath System, is one that Weisman covers in his blog entry Community Health Sys [read] Keywords: community security
1862


PayPal for Mobile: How Secure is Your PayPal Account?
Mon, Jul 21st 2014 4:12p   Liana Lichtenwalner
How secure is PayPal? Secure until you start using your mobile device. According to Kelly Higgin’s article, PayPal Two-Factor Authentication Broken, Dan Saltman, an independent researcher, “reported to PayPal that he had discovered a way to bypass two-factor authentication in Apple iOS, but after getting no response from PayPal, Saltman in April went to friends at mobile security firm Duo Security.” From there, Duo Security confirmed Saltman’s finding and helped him reach PayPal. Duo Sec [read] Keywords: apple application mobile security server
153


More Compromised Students and Faculty
Thu, Jul 17th 2014 7:12a   Liana Lichtenwalner
Recently, there was yet another security breach at a college campus. This time the victim was Butler University, where a hacker accessed over 160,000 records for current, past students and faculty. The information stolen was the typical pertinent information that is stolen in this type of breach. Names, Social Security numbers, date of birth, and bank account information. The announcement of this breach comes due to an identity theft investigation that came from California law enforcement. The p [read] Keywords: database network security
199


Violated Database: Montana Department of Public Health and Human Services
Wed, Jul 16th 2014 2:11p   Liana Lichtenwalner
Your car has been broken into, yet nothing was stolen. Nothing was stolen, so no big deal, right? WRONG! You would still feel violated, creeped out, and concerned about it happening again. The Montana Health Department has experienced a similar data breach. On May 15th, Montana’s Department of Public Health and Human Services (DPHHS) officials noticed out of the ordinary activity. After further investigation, DPHHS confirmed that a server had been breached by hackers, and according to Alison [read] Keywords: database password security server
225


Young Hacker Infiltrates High School Database
Wed, Jul 2nd 2014 11:12a   Liana Lichtenwalner
We live in a world with multiple cyber threats, many coming from alias names from countries we have never been to. Within the United States, we have our fair share of hackers that cause major problems and confiscate sensitive data. It is sad and eye opening when it happens on the high school level. Recently, a 16-year-old boy gained access to a school database that held personal information like grades and attendance. By gaining access to this database, the student was able to change multiple [read] Keywords: database password security




213


Press Release: Get the Level of Identity Management Your Campus NEEDS for Office 365
Fri, Jun 27th 2014 4:11p   Liana Lichtenwalner
BEDFORD, NH– (Marketwire – June 25, 2014) – Today, PistolStar, Inc. announced the integration of its PortalGuard product with Office 365. This integration will give administrators the power to choose the level of convenience and security they desire for their students and faculty while accessing Office 365, including: -Self Service Password Reset (SSPR) -Single Sign-on (SSO) -Two-factor Authentication With PortalGuard integrated with Office 365, schools now get the level of ide [read] Keywords: applications desktop email google integration interface office password security
276


From Hacktivist to Cybersleuth
Fri, Jun 20th 2014 8:11a   Liana Lichtenwalner
It’s just like something from out of the movies: criminal mastermind gets caught, turns from his wicked ways, and eventual unveils a piece of the criminal mastermind world to help out the good guys. There is something intriguing in being able to see into the criminal mastermind and get a behind the scenes look at the secret life of these hacktivist. In the hacktivists’ world, there is a network of secret groups and ominous aliases that threaten to breach and expose a multitude of private and [read] Keywords: network
250


Press Release: Strengthening Web Authentication, Without Overcorrecting
Thu, Jun 5th 2014 3:11p   Liana Lichtenwalner
CLICK to View Video BEDFORD, NH–(Marketwired – Jun 3, 2014) – Today, PistolStar, Inc. announced immediate availability of PortalGuard’s newest solution, PassiveKey. PortalGuard’s PassiveKey is a customer driven response to deliver the latest in innovative identity solutions. PassiveKey transparently enables two-factor authentication while allowing the user to login with the familiar username/password approach. This simultaneously strengthens authentication and elimi [read] Keywords: password security server
266


Honesty is the Best Policy: Passwords, IT Security Professionals, and Llamas!
Tue, Jun 3rd 2014 8:14a   Liana Lichtenwalner
Well, the truth is that many organizations are just not enforcing the basics of Password Best Policies (PBP), never mind investing and enforcing stronger identity security. With much emphasis on ROI, the truth is IT Security Professionals make the dangerous decision to purchase the minimal authentication solution just to have “something” in place. And the truth about Llamas is never tick-off a Llama; they spit when provoked or threatened! Passwords are precious things and have lost their i [read] Keywords: policies password security




Created and Maintained by Yancy Lent - About - Blog Submission - Suggestions - Change Log - Blog Widget - Advertising - Mobile Edition