XML Sitemap

This is a XML Sitemap which is supposed to be processed by search engines which follow the XML Sitemap standard like Ask.com, Bing, Google and Yahoo.
It was generated using the WordPress content management system and the Google Sitemap Generator Plugin by Arne Brachhold.
You can find more information about XML sitemaps on sitemaps.org and Google's list of sitemap programs.

URLPriorityChange frequencyLast modified (GMT)
https://dataprotectioncenter.com/mobile-security-2/attackers-can-install-malware-on-ios-via-mdm-solutions/20%Hourly2016-04-01 08:54
https://dataprotectioncenter.com/vulnerabilities-2/security-holes-found-in-state-visa-database-report/20%Hourly2016-04-01 08:41
https://dataprotectioncenter.com/hacker/hackers-breaching-law-firms-for-insider-trading-info/20%Hourly2016-04-01 08:47
https://dataprotectioncenter.com/data-loss/ryan-wants-irs-to-immediately-adopt-security-recommendations/20%Hourly2016-03-31 08:57
https://dataprotectioncenter.com/access-control-2/let-me-get-that-door-for-you-remote-root-vulnerability-in-hid-door-controllers/20%Hourly2016-03-31 08:41
https://dataprotectioncenter.com/vulnerabilities-2/1400-vulnerabilities-found-in-automated-medical-supply-system/20%Hourly2016-04-01 08:29
https://dataprotectioncenter.com/vulnerabilities-2/security-flaw-in-truecaller-exposes-millions-of-android-users/20%Hourly2016-03-31 09:00
https://dataprotectioncenter.com/network-security-2/security-vs-saas-the-smb-dilemma/20%Hourly2016-03-30 08:09
https://dataprotectioncenter.com/wireless-security-2/is-your-company-focusing-on-the-right-security-trends/20%Hourly2016-03-30 08:23
https://dataprotectioncenter.com/mobile-security-2/creating-secure-devices-for-the-internet-of-things/20%Hourly2016-03-30 08:11
https://dataprotectioncenter.com/vulnerabilities-2/zen-cart-patches-multiple-xss-vulnerabilities/20%Hourly2016-03-29 07:12
https://dataprotectioncenter.com/access-control-2/fbi-cracks-iphone-no-longer-needs-apples-assistance/20%Hourly2016-03-29 07:16
https://dataprotectioncenter.com/virus-and-malware/computer-virus-forces-dc-healthcare-giant-offline-reports/20%Hourly2016-03-29 06:57
https://dataprotectioncenter.com/malware/pos-malware-tool-treasurehunt-targets-small-us-based-banks-retailers/20%Hourly2016-03-29 07:20
https://dataprotectioncenter.com/access-control-2/banks-failing-with-password-management-but-why/20%Hourly2016-03-28 07:58
https://dataprotectioncenter.com/vulnerabilities-2/https-may-not-be-as-safe-as-it-once-was/20%Hourly2016-03-28 07:52
https://dataprotectioncenter.com/data-loss/data-on-1-5-million-verizon-enterprise-customers-up-for-sale/20%Hourly2016-03-28 07:55
https://dataprotectioncenter.com/network-security-2/why-botnets-remain-the-go-to-weapon-for-cybercriminals/20%Hourly2016-03-25 09:05
https://dataprotectioncenter.com/malware/keep-your-pos-machines-safe/20%Hourly2016-03-25 08:57
https://dataprotectioncenter.com/email-security-2/lost-emails-from-clinton-server-discovered/20%Hourly2016-03-25 09:00
https://dataprotectioncenter.com/privacy-protection-2/report-obamacare-site-faced-316-cyber-incidents/20%Hourly2016-03-24 09:21
https://dataprotectioncenter.com/network-security-2/network-security-operations-becoming-more-difficult/20%Hourly2016-03-24 09:02
https://dataprotectioncenter.com/application-security-2/microsoft-adds-macros-lockdown-feature-in-office-2016-in-response-to-increasing-attacks/20%Hourly2016-03-24 09:15
https://dataprotectioncenter.com/vulnerabilities-2/two-dozen-vehicles-found-to-have-wireless-key-entry-systems-that-are-vulnerable-to-hacking/20%Hourly2016-03-23 08:37
https://dataprotectioncenter.com/network-security-2/5-key-questions-to-determine-your-security-posture/20%Hourly2016-03-23 08:46
https://dataprotectioncenter.com/privacy-protection-2/tor-project-says-it-can-quickly-catch-spying-code/20%Hourly2016-03-22 08:53
https://dataprotectioncenter.com/mobile-security-2/when-it-comes-to-mobile-security-how-much-is-enough/20%Hourly2016-03-22 08:48
https://dataprotectioncenter.com/malware/carbanak-cyber-thieves-newest-attacks-exposed/20%Hourly2016-03-22 08:55
https://dataprotectioncenter.com/privacy-protection-2/edward-snowden-privacy-cant-depend-on-corporations-standing-up-to-the-government/20%Hourly2016-03-21 09:13
https://dataprotectioncenter.com/vulnerabilities-2/its-official-the-fbi-says-car-hacking-is-a-real-risk/20%Hourly2016-03-21 09:08
https://dataprotectioncenter.com/data-loss/whos-on-first-creating-a-data-security-roster-to-safeguard-data-from-insiders/20%Hourly2016-03-21 09:02
https://dataprotectioncenter.com/malware/changing-the-security-mindset-for-the-iot/20%Hourly2016-03-18 09:06
https://dataprotectioncenter.com/access-control-2/insight-into-critical-data-remains-limited/20%Hourly2016-03-18 09:09
https://dataprotectioncenter.com/mobile-security-2/idg-contributor-network-does-a-smartphone-make-two-factor-authentication/20%Hourly2016-03-18 09:03
https://dataprotectioncenter.com/threats-and-malware/silver-bullets-to-address-emerging-threats-and-maintain-your-security-posture/20%Hourly2016-03-17 10:12
https://dataprotectioncenter.com/data-loss/defunct-iphone-app-exposes-details-of-198000-users/20%Hourly2016-03-17 10:07
https://dataprotectioncenter.com/malware/malvertising-campaign-hits-msn-com-ny-times-bbc-aol/20%Hourly2016-03-17 10:18
https://dataprotectioncenter.com/vulnerabilities-2/security-concerns-over-connected-devices-mask-the-greater-threat-2/20%Hourly2016-03-16 09:19
https://dataprotectioncenter.com/network-security-2/protect-your-supply-chain-with-a-third-party-risk-management-program/20%Hourly2016-03-16 09:12
https://dataprotectioncenter.com/hacker/hacking-a-car-a-real-threat-or-yet-another-shocker/20%Hourly2016-03-15 10:21
https://dataprotectioncenter.com/vulnerabilities-2/vulnerabilities-on-soc-powered-android-devices-have-implications-for-the-iot/20%Hourly2016-03-15 09:54
https://dataprotectioncenter.com/data-loss/ftc-studying-practices-of-nine-pci-companies/20%Hourly2016-03-15 10:18
https://dataprotectioncenter.com/malware/security-concerns-over-connected-devices-mask-the-greater-threat/20%Hourly2016-03-15 10:24
https://dataprotectioncenter.com/email-security-2/how-to-configure-email-encryption-in-apple-mail/20%Hourly2016-03-15 10:37
https://dataprotectioncenter.com/privacy-protection-2/obama-on-encryption-its-fetishizing-our-phones-above-every-other-value/20%Hourly2016-03-14 10:53
https://dataprotectioncenter.com/network-security-2/governance-the-often-missing-piece-of-information-security/20%Hourly2016-03-14 10:49
https://dataprotectioncenter.com/malware/how-banking-trojans-bypass-two-factor-authentication/20%Hourly2016-03-14 10:44
https://dataprotectioncenter.com/data-loss/data-management-101-how-to-stay-off-this-years-list-of-corporate-data-breaches/20%Hourly2016-03-14 10:37
https://dataprotectioncenter.com/tracking-2/new-ways-to-fingerprint-tor-browser-users-discovered/20%Hourly2016-03-14 10:32
https://dataprotectioncenter.com/malware/android-trojan-posing-as-flash-player-targets-banking-apps/20%Hourly2016-03-11 11:58
https://dataprotectioncenter.com/cyber-crime-2/security-training-for-incident-handlers-whats-out-there/20%Hourly2016-03-11 12:01
https://dataprotectioncenter.com/vulnerabilities-2/critical-bug-in-libotr-could-open-users-of-chatsecure-adium-pidgin-to-compromise/20%Hourly2016-03-11 12:04
https://dataprotectioncenter.com/privacy-protection-2/fcc-wants-isps-to-get-customer-permission-before-sharing-personal-data/20%Hourly2016-03-11 10:51
https://dataprotectioncenter.com/security/rsa-2016-top-four-takeaways/20%Hourly2016-03-11 10:19
https://dataprotectioncenter.com/malware/locky-ransomware-activity-ticks-up/20%Hourly2016-03-10 09:49
https://dataprotectioncenter.com/access-control-2/security-trends-from-rsa-conference-2016-in-san-francisco/20%Hourly2016-03-10 09:58
https://dataprotectioncenter.com/privacy-protection-2/experts-say-chip-off-procedure-to-access-terrorists-iphone-is-risky/20%Hourly2016-03-10 09:46
https://dataprotectioncenter.com/vulnerabilities-2/hacking-internet-connected-trucks-and-buses/20%Hourly2016-03-10 09:43
https://dataprotectioncenter.com/vulnerabilities-2/smart-buildings-dumb-security/20%Hourly2016-03-10 09:54
https://dataprotectioncenter.com/privacy-protection-2/encryption-project-issues-1-million-free-digital-certificates-in-three-months/20%Hourly2016-03-09 09:24
https://dataprotectioncenter.com/data-loss/2015-the-year-data-theft-got-real/20%Hourly2016-03-09 09:27
https://dataprotectioncenter.com/application-security-2/ponemon-institute-study-most-organizations-dont-know-what-they-do-know-when-assessing-application-security-risk/20%Hourly2016-03-09 09:22
https://dataprotectioncenter.com/vulnerabilities-2/microsoft-security-updates-march-2016/20%Hourly2016-03-09 09:38
https://dataprotectioncenter.com/email-security-2/email-may-not-be-a-safe-mode-of-communication/20%Hourly2016-03-08 09:13
https://dataprotectioncenter.com/application-security-2/how-to-stay-secure-on-tumblr/20%Hourly2016-03-08 09:26
https://dataprotectioncenter.com/hacker/hack-a-mobile-phones-fingerprint-sensor-in-15-minutes/20%Hourly2016-03-08 09:16
https://dataprotectioncenter.com/mobile-security-2/verizon-wireless-settles-fcc-complaint-about-supercookie-tracking/20%Hourly2016-03-08 09:31
https://dataprotectioncenter.com/privacy-protection-2/is-online-banking-safe/20%Hourly2016-03-07 09:05
https://dataprotectioncenter.com/data-loss/electronic-frontier-foundation-opinion-piece-pokes-holes-in-eu-u-s-privacy-shield/20%Hourly2016-03-07 09:02
https://dataprotectioncenter.com/malware/ransomware-developers-target-apple-customers/20%Hourly2016-03-07 09:08
https://dataprotectioncenter.com/cyber-warfare-2/feds-go-after-online-payment-firm-for-deceptive-cybersecurity/20%Hourly2016-03-07 08:59
https://dataprotectioncenter.com/privacy-protection-2/amazons-bringing-encryption-back-to-its-fire-tablets/20%Hourly2016-03-07 09:11
https://dataprotectioncenter.com/hacker/why-is-medical-data-so-difficult-to-protect/20%Hourly2016-03-04 09:08
https://dataprotectioncenter.com/data-loss/cox-investigates-possible-data-breach-report/20%Hourly2016-03-04 09:05
https://dataprotectioncenter.com/network-security-2/cisco-removes-weak-default-static-credentials-from-its-switches/20%Hourly2016-03-04 09:03
https://dataprotectioncenter.com/network-security-2/incident-response-should-never-end/20%Hourly2016-03-03 09:30
https://dataprotectioncenter.com/data-loss/krebs-wendys-breach-losses-may-exceed-those-of-target-home-depot-incidents/20%Hourly2016-03-03 09:25
https://dataprotectioncenter.com/hacker/hack-the-pentagon-dod-launches-first-ever-federal-bug-bounty-program/20%Hourly2016-03-03 09:42
https://dataprotectioncenter.com/phishing/irs-issues-warning-to-hr-professionals-over-phishing-scam/20%Hourly2016-03-03 09:18
https://dataprotectioncenter.com/cloud-security/skills-shortage-containerization-other-cloud-security-concerns/20%Hourly2016-03-03 09:39
https://dataprotectioncenter.com/mobile-security-2/companies-are-realizing-that-security-and-privacy-go-hand-in-hand/20%Hourly2016-03-02 09:52
https://dataprotectioncenter.com/cloud-security/keeping-your-sanity-securing-iaas-paas-and-saas-cloud-services-part-ii/20%Hourly2016-03-02 09:39
https://dataprotectioncenter.com/privacy-protection-2/as-encryption-debate-rages-inventors-of-public-key-encryption-win-prestigious-turing-award/20%Hourly2016-03-02 09:43
https://dataprotectioncenter.com/network-security-2/kaspersky-launches-targeted-attack-protection-platform/20%Hourly2016-03-02 10:10
https://dataprotectioncenter.com/application-security-2/irs-raises-number-of-get-transcript-app-breach-victims-yet-again/20%Hourly2016-03-01 10:01
https://dataprotectioncenter.com/cyber-crime-2/pirates-ships-and-a-hacked-cms-inside-verizons-breach-investigations/20%Hourly2016-03-01 09:40
https://dataprotectioncenter.com/privacy-protection-2/us-eu-face-blowback-on-data-deal/20%Hourly2016-03-01 09:37