Access "Don't keep quiet after a data security breach"
This article is part of the June 2010 issue of Finding affordable encryption options for laptop data security
Cybercriminals have upped the ante against organizations by relentlessly targeting them in more ruthless ways. The amount of data corporations are losing is increasing. The costs to repair the damages are skyrocketing and the confidence we once had in the ecommerce infrastructure is fading. Cybercriminals have developed better "fire power" like new malware designed to evade detection. They have taken the time to understand the vulnerabilities in your network. And, they have learned how to maximize their profit margins by breaking into multiple corporations at the same time, using the same malware and SQL injections they've proven can work again and again. They've built a very lucrative and repeatable business. They can do this, in part, because of our unwillingness to work together and share information once we've been breached. When organizations are the victims of data breach crimes, they are more likely to stay silent than work with law enforcement. Instead of fighting the enemy, we end up fighting ourselves. In the long run, this ends up costing more and... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Cloud computing risks and how to manage them
by Tim Mather
Cloud computing alters enterprise risk. Here's what you need to know in order to safely navigate the cloud.
-
Use full disk or file/folder encryption for laptop data security
by Dave Shackleford
Learn about the options for protecting laptop data, including full disk encryption and file/folder encryption, and their associated deployment and management challenges.
-
Cloud computing risks and how to manage them
by Tim Mather
-
-
Symantec acquisitions cement encryption-as-a-feature
Symantec acquisitions of PGP and Guardian Edge future ensures that encryption is becoming less of a standalone security tool.
-
Demystifying governance, risk and compliance
by David Schneier
GRC aims to bring together disparate compliance efforts in the enterprise, but the concept has been stymied by a lack of clarity. Developing a GRC program requires three key steps.
-
Symantec acquisitions cement encryption-as-a-feature
-
Columns
-
Don't keep quiet after a data security breach
by Kim Getgen and Kimberly Kiefer Peretti
Organizations who stay silent after a data security breach end up paying a higher price and helping cybercriminals.
-
Weighing the risk of hiring hackers
Bruce Schneier and Marcus Ranum debate the risks associated with hiring hackers.
-
Information security spending shouldn't be driven by compliance
If you're spending more to protect custodial data because of compliance than you are to protect company secrets, you're missing the big picture.
-
Don't keep quiet after a data security breach
by Kim Getgen and Kimberly Kiefer Peretti
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO