100+ datasets found
  1. m

    Data Breach Notification Reports

    • mass.gov
    Updated Jan 19, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Consumer Affairs and Business Regulation (2019). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports
    Explore at:
    Dataset updated
    Jan 19, 2019
    Dataset authored and provided by
    Office of Consumer Affairs and Business Regulation
    Area covered
    Massachusetts
    Description

    View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

  2. All-time biggest online data breaches 2024

    • statista.com
    Updated Nov 1, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). All-time biggest online data breaches 2024 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Nov 1, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2024
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2024 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  3. w

    ios-security-breach.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Updated Jun 16, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc (2017). ios-security-breach.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/ios-security-breach.com/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jun 16, 2017
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Mar 26, 2025
    Description

    Explore the historical Whois records related to ios-security-breach.com (Domain). Get insights into ownership history and changes over time.

  4. S

    Security Baseline Check Report

    • marketresearchforecast.com
    doc, pdf, ppt
    Updated Mar 8, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Forecast (2025). Security Baseline Check Report [Dataset]. https://www.marketresearchforecast.com/reports/security-baseline-check-30141
    Explore at:
    ppt, pdf, docAvailable download formats
    Dataset updated
    Mar 8, 2025
    Dataset authored and provided by
    Market Research Forecast
    License

    https://www.marketresearchforecast.com/privacy-policyhttps://www.marketresearchforecast.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Security Baseline Check market is experiencing robust growth, driven by the increasing sophistication of cyber threats and the stringent regulatory compliance requirements across various industries. The market, estimated at $15 billion in 2025, is projected to maintain a healthy Compound Annual Growth Rate (CAGR) of 15% from 2025 to 2033, reaching approximately $50 billion by 2033. This expansion is fueled by several key factors. Firstly, the rising adoption of cloud computing and digital transformation initiatives across SMEs and large enterprises necessitates comprehensive security assessments. Secondly, the increasing frequency and severity of data breaches are compelling organizations to proactively invest in robust security baseline checks to mitigate risks and protect sensitive data. Furthermore, evolving regulatory landscapes like GDPR and CCPA mandate stringent security protocols, further bolstering the demand for these services. The market segmentation reveals a strong emphasis on host security checks, followed by database and network security equipment checks, reflecting the criticality of securing core infrastructure components. Geographically, North America and Europe currently hold significant market share, driven by high technological adoption and stringent security regulations. However, rapidly growing digital economies in Asia Pacific and the Middle East & Africa present lucrative growth opportunities. The competitive landscape is characterized by a mix of established cloud providers like Alibaba Cloud, Amazon, Microsoft, and Huawei Cloud, alongside specialized security firms like OWASP and Antiy Labs. These players are constantly innovating to offer comprehensive and integrated security solutions that meet the evolving needs of their clients. While the market is experiencing substantial growth, challenges such as the high cost of implementation, integration complexities, and the need for skilled professionals could potentially restrain its growth. However, the overall market trajectory points towards a sustained period of expansion, driven by the imperative to secure digital assets and comply with regulatory requirements. The continued evolution of cybersecurity threats will further fuel the demand for sophisticated baseline checks across all segments and regions.

  5. d

    Data Breach Notifications Affecting Washington Residents (Personal...

    • catalog.data.gov
    • data.wa.gov
    • +1more
    Updated Mar 22, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    data.wa.gov (2025). Data Breach Notifications Affecting Washington Residents (Personal Information Breakdown) [Dataset]. https://catalog.data.gov/dataset/data-breach-notifications-affecting-washington-residents-personal-information-breakdown
    Explore at:
    Dataset updated
    Mar 22, 2025
    Dataset provided by
    data.wa.gov
    Area covered
    Washington
    Description

    Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the breach. This dataset breaks out the individual types of breached personal information that were identified in each notice our office received. This data is used to produce the AGO’s Annual Data Breach Report. For additional statistics relating to data breaches, also see the main dataset at: https://data.wa.gov/Consumer-Protection/Data-Breach-Notifications-Affecting-Washington-Res/sb4j-ca4h.

  6. w

    internet-security-gateway.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, internet-security-gateway.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/internet-security-gateway.com/
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Mar 21, 2025
    Description

    Explore the historical Whois records related to internet-security-gateway.com (Domain). Get insights into ownership history and changes over time.

  7. D

    Data-Loss Prevention (DLP) Report

    • marketresearchforecast.com
    doc, pdf, ppt
    Updated Mar 16, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Forecast (2025). Data-Loss Prevention (DLP) Report [Dataset]. https://www.marketresearchforecast.com/reports/data-loss-prevention-dlp-37138
    Explore at:
    doc, ppt, pdfAvailable download formats
    Dataset updated
    Mar 16, 2025
    Dataset authored and provided by
    Market Research Forecast
    License

    https://www.marketresearchforecast.com/privacy-policyhttps://www.marketresearchforecast.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Data-Loss Prevention (DLP) market is experiencing robust growth, driven by increasing cyber threats and stringent data privacy regulations like GDPR and CCPA. The market, estimated at $15 billion in 2025, is projected to achieve a Compound Annual Growth Rate (CAGR) of 12% from 2025 to 2033, reaching approximately $40 billion by 2033. This expansion is fueled by the rising adoption of cloud computing, the proliferation of mobile devices, and the growing need to protect sensitive data across diverse environments. Key market drivers include the escalating costs associated with data breaches, the increasing awareness of data security risks amongst organizations, and the growing demand for advanced DLP solutions that can effectively address sophisticated attack vectors. Market segmentation reveals strong growth across all application areas—individuals, families, and enterprises—with the enterprise segment dominating due to its higher spending capacity and greater vulnerability to data breaches. The advanced measures segment within the DLP solutions category is experiencing particularly rapid expansion, driven by the demand for AI-powered threat detection and response capabilities. Geographic regions such as North America and Europe currently hold significant market share, but Asia-Pacific is poised for substantial growth due to increasing digitalization and rising adoption of DLP solutions in emerging economies. However, the market faces certain restraints, including the high cost of implementation and maintenance of DLP solutions, the complexity of integrating DLP technologies with existing security infrastructure, and the shortage of skilled cybersecurity professionals. Despite these challenges, the overall outlook for the DLP market remains positive. The increasing sophistication of cyberattacks and the growing regulatory landscape are expected to propel the adoption of more robust and comprehensive DLP solutions. Furthermore, advancements in artificial intelligence (AI) and machine learning (ML) are playing a significant role in enhancing the effectiveness of DLP technologies. Continuous innovation in areas such as data classification, anomaly detection, and endpoint security is contributing to the development of more sophisticated and adaptable DLP solutions, catering to the evolving needs of individuals, families, and enterprises alike. The market's trajectory strongly indicates a continued rise in demand for DLP solutions across diverse sectors, reinforcing the crucial role of data protection in the increasingly digital world.

  8. w

    internet-of-things-security.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    internet-of-things-security.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/internet-of-things-security.com/
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Mar 27, 2025
    Description

    Explore the historical Whois records related to internet-of-things-security.com (Domain). Get insights into ownership history and changes over time.

  9. D

    Data Loss Prevention (DLP) Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Mar 18, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Data Loss Prevention (DLP) Market Report [Dataset]. https://www.marketreportanalytics.com/reports/data-loss-prevention-dlp-market-10628
    Explore at:
    ppt, doc, pdfAvailable download formats
    Dataset updated
    Mar 18, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Data Loss Prevention (DLP) market is experiencing robust growth, projected to reach $2.13 billion in 2025 and exhibiting a Compound Annual Growth Rate (CAGR) of 29.52% from 2025 to 2033. This surge is driven by the increasing frequency and severity of data breaches, stringent data privacy regulations like GDPR and CCPA, and the rising adoption of cloud computing and remote work models. Businesses across all sectors are prioritizing data security to protect sensitive customer information, intellectual property, and financial data, fueling demand for comprehensive DLP solutions. The market segmentation reveals key trends. Cloud-based DLP deployments are gaining significant traction due to their scalability, accessibility, and cost-effectiveness. Among technologies, endpoint DLP is witnessing strong adoption due to the proliferation of mobile devices and the need for robust data protection at the endpoint level. Network DLP solutions are also in high demand, enabling organizations to monitor and control data flow across their network infrastructure. North America currently holds a significant market share, driven by early adoption of DLP technologies and stringent regulatory frameworks. However, the APAC region, particularly China and Japan, is poised for rapid growth due to increasing digitalization and rising awareness of data security risks. Key players like Acronis, Broadcom, Check Point, and Cisco are strategically investing in R&D, acquisitions, and partnerships to enhance their product offerings and expand their market presence. The competitive landscape is characterized by intense innovation, with companies focusing on advanced features like AI-powered threat detection, automated remediation, and improved integration with existing security infrastructure. Despite this growth, market restraints include the high initial investment cost of DLP solutions, the complexity of implementation and management, and the potential for false positives.

  10. Cyber Security - Global Thematic Research

    • store.globaldata.com
    Updated Nov 4, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    GlobalData UK Ltd. (2016). Cyber Security - Global Thematic Research [Dataset]. https://store.globaldata.com/report/cyber-security-global-thematic-research/
    Explore at:
    Dataset updated
    Nov 4, 2016
    Dataset provided by
    GlobalDatahttps://www.globaldata.com/
    Authors
    GlobalData UK Ltd.
    License

    https://www.globaldata.com/privacy-policy/https://www.globaldata.com/privacy-policy/

    Time period covered
    2016 - 2020
    Area covered
    Global
    Description

    The world has entered the era of the Code War where every digital device, however small and innocuous, can be “weaponised” – as the recent Dyn cyber-attack aptly illustrated – to send “rogue code” deep into the Internet's engine room to create mayhem.
    Cybersecurity is critical to almost every business. Yet it is a non-core competence for most boards. The frequency of high profile corporate data breaches may accelerate because CEOs are not sufficiently trained in cyber risks.
    Almost every cyber-breach is an “inside job” – whether malicious or accidental – so real-time behavioural analytics is becoming increasingly important as a defense.
    Insidt this report, we look at the evolution, nature, growth in cybersecurity technologies and threat. Read More

  11. F

    Firewall As A Service Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Mar 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AMA Research & Media LLP (2025). Firewall As A Service Market Report [Dataset]. https://www.marketreportanalytics.com/reports/firewall-as-a-service-market-3624
    Explore at:
    ppt, doc, pdfAvailable download formats
    Dataset updated
    Mar 14, 2025
    Dataset authored and provided by
    AMA Research & Media LLP
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Firewall as a Service (FWaaS) market is experiencing robust growth, projected to reach $1.04 billion in 2025 and maintain a Compound Annual Growth Rate (CAGR) of 31.8% from 2025 to 2033. This expansion is driven by several key factors. The increasing adoption of cloud-based infrastructure and applications necessitates robust security solutions like FWaaS, offering scalability, cost-effectiveness, and simplified management compared to traditional on-premise firewalls. Furthermore, the rise in sophisticated cyber threats and data breaches fuels demand for advanced security features offered by FWaaS providers, including intrusion prevention, malware protection, and advanced threat intelligence. The shift towards remote work models also significantly boosts the market, as organizations require secure access to corporate networks from various locations. The BFSI (Banking, Financial Services, and Insurance), Healthcare, and Retail sectors are leading adopters, driven by stringent regulatory compliance and the need to protect sensitive customer data. The competitive landscape is characterized by a mix of established players like Check Point, Palo Alto Networks, and Fortinet, alongside emerging vendors offering specialized solutions. Differentiation is achieved through advanced features, integration capabilities, and pricing models. While the market exhibits strong growth potential, challenges remain, including concerns about security vulnerabilities, vendor lock-in, and the need for robust integration with existing IT infrastructure. The geographic distribution shows a concentration in North America and Europe initially, but APAC is expected to witness significant growth fueled by increasing digital adoption and economic development in regions like China and India. This continued expansion will depend on factors such as advancements in artificial intelligence (AI) and machine learning (ML) for threat detection, as well as the ongoing evolution of cloud security architectures.

  12. A

    FIIS_Breach_Shorelines.shp - Fire Island National Seashore Wilderness Breach...

    • data.amerigeoss.org
    • data.usgs.gov
    • +3more
    xml
    Updated Aug 23, 2022
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    United States (2022). FIIS_Breach_Shorelines.shp - Fire Island National Seashore Wilderness Breach Shoreline Data Collected from Fire Island, New York, October 2014 to September 2016 [Dataset]. https://data.amerigeoss.org/dataset/fiis-breach-shorelines-shp-fire-island-national-seashore-wilderness-breach-shoreline-data-2443f
    Explore at:
    xmlAvailable download formats
    Dataset updated
    Aug 23, 2022
    Dataset provided by
    United States
    Area covered
    Fire Island, New York
    Description

    Hurricane Sandy made U.S. landfall, coincident with astronomical high tides, near Atlantic City, New Jersey, on October 29, 2012. The storm, the largest on historical record in the Atlantic basin, affected an extensive area of the east coast of the United States. The highest waves and storm surge were focused along the heavily populated New York and New Jersey coasts. At the height of the storm, a record significant wave height of 9.6 meters (m) was recorded at the wave buoy offshore of Fire Island, New York. During the storm an overwash channel opened a breach in the location of Old Inlet, in the Otis Pike High Dunes Wilderness Area. This breach is referred to as the wilderness breach (fig 1).

    Fire Island, New York is the site of a long term coastal morphologic change and processes project conducted by the U.S. Geological Survey (USGS). One of the objectives of the project was to understand the morphologic evolution of the barrier system on a variety of time scales (days - years - decades - centuries). In response to Hurricane Sandy, this effort continued with the intention of resolving storm impact and the response and recovery of the beach. The day before Hurricane Sandy made landfall (October 28, 2012), a USGS field team conducted differential global positioning system (DGPS) surveys at Fire Island to quantify the pre-storm morphologic state of the beach and dunes. The area was re-surveyed after the storm, as soon as access to the island was possible. In order to fully capture the recovery of the barrier system, the USGS Hurricane Sandy Supplemental Fire Island Study was established to include collection in the weeks, months, and years following the storm.

    As part of the USGS Hurricane Sandy Supplemental Fire Island Study, the beach is monitored periodically to enable better understanding of post-Sandy recovery. The alongshore state of the beach is recorded using a DGPS to collect data around the mean high water elevation (MHW; 0.46 meter North American Vertical Datum of 1988) to derive a shoreline, and the cross-shore response and recovery are measured along a series of 15 profiles. Monitoring continued in the weeks following Hurricane Sandy with additional monthly collection through April 2013 and repeat surveys every 2–3 months thereafter until October 2014. Bi-annual surveys have been collected through September 2016. Beginning in October 2014 the USGS also began collecting shoreline data at the Wilderness breach. The shoreline collected was an approximation of the MHW shoreline. The operator walked an estimated MHW elevation above the water line and below the berm crest, using knowledge of tides and local conditions to interpret a consistent shoreline. See below for survey collection dates for all data types.

    This shapefile FIIS_Breach_Shorelines.shp consists of Fire Island, NY breach shorelines collected following an interpreted MHW shoreline as identified in the field.

    Oct 28 2012 (MHW shoreline/Cross-shore data) Nov 01 2012 (MHW shoreline/Cross-shore data) Nov 04 2012 (Cross-shore data only) Dec 01 2012 (MHW shoreline/Cross-shore data) Dec 12 2012 (MHW shoreline/Cross-shore data) Jan 10 2013 (MHW shoreline/Cross-shore data) Feb 13 2013 (MHW shoreline/Cross-shore data) Mar 13 2013 (MHW shoreline/Cross-shore data) Apr 09 2013 (MHW shoreline/Cross-shore data) Jun 24 2013 (MHW shoreline/Cross-shore data) Sep 18 2013 (MHW shoreline/Cross-shore data) Dec 03 2013 (MHW shoreline/Cross-shore data) Jan 29 2014 (MHW shoreline/Cross-shore data) Jun 11 2014 (Cross-shore data only) Sep 09 2014 (MHW shoreline/Cross-shore data) Oct 07 2014 (Cross-shore data/MHW Breach shoreline) Jan 21 2015 (MHW shoreline/Cross-shore data/Breach shoreline) Mar 19 2015 (MHW shoreline/Cross-shore data) May 16 2015 (MHW shoreline/Cross-shore data/Breach shoreline) Set 28 2015 (MHW shoreline/Cross-shore data/Breach shoreline) Jan 21 2016 (MHW shoreline/Cross-shore data) Jan 25 2016 (MHW shoreline/Cross-shore data) Apr 06 2016 (Cross-shore data only) Apr 11 2016 (MHW shoreline/Cross-shore data/Breach shoreline) Jun 16 2016 (Cross-shore data only) Sep 27 2016 (MHW shoreline/Cross-shore data/Breach shoreline)

  13. w

    security-ec.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, security-ec.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/security-ec.com/
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Mar 27, 2025
    Description

    Explore the historical Whois records related to security-ec.com (Domain). Get insights into ownership history and changes over time.

  14. f

    Airport security risk data.

    • plos.figshare.com
    xls
    Updated Jan 3, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Yao Hu; Liguang Qiao; Feng Gu (2025). Airport security risk data. [Dataset]. http://doi.org/10.1371/journal.pone.0315799.t008
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jan 3, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Yao Hu; Liguang Qiao; Feng Gu
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The risk assessment and prevention in traditional airport safety assurance usually rely on human experience for analysis, and there are problems such as heavy manual workload, excessive subjectivity, and significant limitations. This article proposed a risk assessment and prevention mechanism for airport security assurance that integrated LSTM algorithm. It analyzed the causes of malfunctioning flights by collecting airport flight safety log datasets. This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. It then handed over the new data to the trained LSTM model for risk assessment and prediction, grading and warning of risks. It monitored the airport security situation in real-time based on the results and quickly notified airport security personnel to handle it. The outcome indicates that the standard error of the LSTM algorithm model training is less than 0.18, and the decision coefficients were all greater than 0.9. The predicted data was highly consistent with the actual data. It can be summarized that the algorithmic model has good accuracy and robustness. The LSTM algorithm can play a role in providing early warning, assisting decision-making, optimizing resources, and enhancing real-time monitoring in airport security assurance. It can effectively improve the safety and prevention capabilities of airports, and reduce the losses caused by potential risks.

  15. cyber.security@oa.mo.gov - Reverse Whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, cyber.security@oa.mo.gov - Reverse Whois Lookup [Dataset]. https://whoisdatacenter.com/email/cyber.security@oa.mo.gov/
    Explore at:
    csvAvailable download formats
    Dataset provided by
    AllHeart Web
    Authors
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Mar 5, 2025
    Description

    Explore historical ownership and registration records by performing a reverse Whois lookup for the email address cyber.security@oa.mo.gov..

  16. w

    internet-security-software.com@yourjungleprivacy.com - Reverse Whois Lookup

    • whoisdatacenter.com
    csv
    Updated Nov 11, 2014
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc (2014). internet-security-software.com@yourjungleprivacy.com - Reverse Whois Lookup [Dataset]. https://whoisdatacenter.com/email/internet-security-software.com@yourjungleprivacy.com/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Nov 11, 2014
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Feb 2, 2025
    Description

    Explore historical ownership and registration records by performing a reverse Whois lookup for the email address internet-security-software.com@yourjungleprivacy.com..

  17. C

    Cloud-Based Data Loss Prevention Report

    • archivemarketresearch.com
    doc, pdf, ppt
    Updated Feb 22, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Archive Market Research (2025). Cloud-Based Data Loss Prevention Report [Dataset]. https://www.archivemarketresearch.com/reports/cloud-based-data-loss-prevention-50008
    Explore at:
    doc, ppt, pdfAvailable download formats
    Dataset updated
    Feb 22, 2025
    Dataset authored and provided by
    Archive Market Research
    License

    https://www.archivemarketresearch.com/privacy-policyhttps://www.archivemarketresearch.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The global cloud-based data loss prevention market is projected to reach a value of 8370.2 million by 2033, exhibiting a CAGR of XX% during the forecast period. The market growth is attributed to the increasing adoption of cloud-based services, rising concerns over data breaches and data leakage, and stringent data protection regulations worldwide. Key market trends include the growing demand for endpoint DLP solutions, the adoption of cloud-based DLP solutions by small and medium enterprises, and the increasing focus on data security in regulated industries. The market is also witnessing the emergence of advanced DLP technologies, such as AI-powered DLP and cloud-native DLP solutions. Major players in the market include Broadcom, Forcepoint, McAfee, Digital Guardian, GTB Technologies, CoSoSys, Spirion, Safetica, InfoWatch, SearchInform, Fidelis, Somansa, Tessian, Zecurion, Code42, Teramind, HelpSystems, SkyGuard, BetterCloud, Zscaler, Check Point, Trend Micro, Nightfall, VIPRE SafeSend, Google, Netskope, and others.

  18. w

    free-download-security.net@whoisprivacycontact.com - Reverse Whois Lookup

    • whoisdatacenter.com
    csv
    Updated Aug 21, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc (2024). free-download-security.net@whoisprivacycontact.com - Reverse Whois Lookup [Dataset]. https://whoisdatacenter.com/email/free-download-security.net@whoisprivacycontact.com/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Aug 21, 2024
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Mar 26, 2025
    Description

    Explore historical ownership and registration records by performing a reverse Whois lookup for the email address free-download-security.net@whoisprivacycontact.com..

  19. g

    Contractor Security Screening Request and Verification

    • forms.mgcs.gov.on.ca
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    forms.mgcs.gov.on.ca, Contractor Security Screening Request and Verification [Dataset]. https://forms.mgcs.gov.on.ca/dataset/002-1983
    Explore at:
    Dataset provided by
    Ministry of Public and Business Service Delivery and Procurementhttps://www.ontario.ca/page/ministry-public-business-service-delivery
    Description

    To request a contractor security screening check and allow for verification of identity of individual applicant

  20. S

    Serverless Security Market Report

    • promarketreports.com
    doc, pdf, ppt
    Updated Feb 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Pro Market Reports (2025). Serverless Security Market Report [Dataset]. https://www.promarketreports.com/reports/serverless-security-market-18539
    Explore at:
    ppt, pdf, docAvailable download formats
    Dataset updated
    Feb 21, 2025
    Dataset authored and provided by
    Pro Market Reports
    License

    https://www.promarketreports.com/privacy-policyhttps://www.promarketreports.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The market size for Serverless Security is projected to reach USD 4.96 billion by 2033, exhibiting a CAGR of 25.51% during the forecast period (2025-2033). The growth of the market is attributed to the increasing adoption of cloud computing, the need for enhanced security measures, and the growing popularity of serverless computing. Additionally, the increasing number of cyber threats and data breaches is driving the demand for serverless security solutions. Key drivers of the serverless security market include the increasing adoption of cloud computing, the need for enhanced security measures, and the growing popularity of serverless computing. The increasing number of cyber threats and data breaches is also driving the demand for serverless security solutions. Major players in the serverless security market include Cloudflare, Microsoft, Check Point Software Technologies, Palo Alto Networks, VMware Inc., F5 Networks, Imperva, Rapid7, Trend Micro Inc., Cisco System, Google Cloud, IBM, Amazon Web Services, Fortinet, and Akamai Technologies. Key drivers for this market are: Growing Cloud Adoption Increasing Security Threats Innovation in Serverless Architectures Rise of Serverless Computing Expanding Regulatory Compliance. Potential restraints include: Rising adoption of serverless architecture Growing concerns over serverless security risks Need for enhanced visibility and control Increasing demand for cloud-native security solutions. Rapid growth of microservices and container-based applications.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Office of Consumer Affairs and Business Regulation (2019). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports

Data Breach Notification Reports

Explore at:
2 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Jan 19, 2019
Dataset authored and provided by
Office of Consumer Affairs and Business Regulation
Area covered
Massachusetts
Description

View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

Search
Clear search
Close search
Google apps
Main menu