• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • Data Strategy Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 

Data Loss

Italian bank suffers major cyber incident
Italy's biggest bank, UniCredit, suffers major cyber breach

Personal data belonging to hundreds of thousands of customers stolen

  • Security
  • 27 July 2017
data-persona
Top 4 data and storage protection tips for 2017

44 zettabytes are coming - are you ready?

  • Datacentre
  • 29 November 2016
cyber-security
Drupal issues major security fixes for flaw probably used in Panama Papers breach

Critical flaws patched

  • Security
  • 14 July 2016
Encryption graphic
Let's Encrypt accidentally mails out subscriber addresses

Free service for issuing digital certificates admits to incident and apologises to affected users

  • Privacy
  • 13 June 2016
Facebook 'dislike' button mockup
Security researcher breaches Facebook corporate network

Orange Tsai gained access to Facebook workers' usernames and passwords

  • Security
  • 25 April 2016
coding-error
Error exposes emails on Code.org website

Clumsy code rather than hack attack highlights the need for companies to be increasingly aware of data protection

  • Security
  • 14 March 2016
Silicon SAFE
V3 Startup Spotlight: Data security firm Silicon:SAFE

Co-founder and CTO Dr Will Harwood goes under the startup spotlight

  • Small Business
  • 02 February 2016
Hand pulling open a blind
Web users should take more responsibility for data privacy, warns FireEye CIO

Sophisticated hackers are targeting the IoT and mobiles, says Julie Cullivan

  • Security
  • 28 January 2016
add-more-email-subscribers
Google bulks up Gmail security with data loss prevention tool

Email feature scans emails and attachments to curb data leaks

  • Security
  • 11 December 2015
A smartphone being used in the dark
Aer Lingus, easyJet and Chiltern Railways accused of exposing credit card data

Mobile flaws blamed for sending unencrypted customer data

  • Security
  • 09 December 2015
Nicola Fulford head of data protection and privacy at Kemp Little
Legal view: How the General Data Protection Regulation will affect IoT firms

Kemp Little's Nicola Fulford explores the effects of evolving data regulations

  • Law
  • 27 November 2015
Kelly Brook
Don't make boob of yourself searching the web for Kelly Brook

Hackers hiding viruses in celebrity online searches

  • Security
  • 01 October 2015
The Morrisons website
Morrisons auditor jailed for eight years after leaking data on 100,000 employees

Jury found Andrew Skelton guilty of three charges of fraud

  • Security
  • 20 July 2015
Man with head in hands
Hacking Team hack, mad data breaches and naked selfies theft: Top 10 bizarre security blunders

V3 looks back at some of the more embarrassing security incidents to hit the headlines over the years

  • Security
  • 10 July 2015
Cloud computing security
US tax department pushes cyber security overhaul after hack attack

Sweeping changes to clean up networks and cover citizens

  • Security
  • 15 June 2015
Circuit board padlock
Google and Facebook must respect individuals' privacy

People must be prepared to challenge tech giants in the courts, claims law professor

  • Security
  • 05 June 2015
Intel and The INQUIRER are hosting a live chat on the Internet of Things
IoT spending to hit $1.7tn a year by 2020 despite security threats

But significant security challenges remain, warns IDC

  • Software
  • 04 June 2015
US President Barack Obama
NSA phone surveillance limited by USA Freedom Act

Legislation curtails bulk phone surveillance, but privacy groups still express concerns

  • Communications
  • 03 June 2015
money-pound-notes
Cyber crooks costing UK businesses £2.4m per breach

Encryption and education are the answer

  • Security
  • 27 May 2015
dark-hoodie
Hackers compromise 100,000 IRS accounts

Financial information stolen using insecure Get Transcript application

  • Security
  • 27 May 2015
Keep CDs and DVDs in good condition step 3
ICO fines South Wales Police £160,000 over DVD data loss

Disk containing sensitive video evidence left in an unlocked drawer

  • Internet
  • 18 May 2015
target-store-logo
Target pitches $10m settlement following mega data breach

Victims could be paid $10,000 each in damages

  • Privacy
  • 19 March 2015
NHS England to forge ahead with 'unchanged' care.data plans
Hackers will target online NHS medical data, warns ICO

NHS must consider how to share medical records without damaging patient privacy

  • Government
  • 10 February 2015
dark-hoodie
Heartbleed, rampaging Poodles and Snowmen: Top 10 security threats 2014

A run down of the biggest cyber threats to emerge this year

  • Security
  • 12 December 2014
123

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
British security start-up launches lip-sync authentication technology
British security start-up launches lip-sync authentication technology
AI could improve global stability from around 2040, claims US thinktank RAND Corporation
AI could improve global stability from around 2040, claims US thinktank RAND Corporation
Almost 90 per cent of UK websites suffer from 'serious' security flaws
Almost 90 per cent of UK websites suffer from 'serious' security flaws
How NoSQL database technology and IoT sensors are being put to work saving endangered elephants and tigers
How NoSQL database technology and IoT sensors are being put to work saving endangered elephants and tigers
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017