Access "Disclosure Laws Fail as an Incentive to Secure Data"
This article is part of the April 2008 issue of Security Readers' Choice Awards 2008
Disclosure fails as an incentive to protect data. Based on media coverage, an outside observer would conclude that the rate of data leakage has suddenly increased dramatically, putting individuals at huge risk of identity theft. Commercial firms and government agencies throughout the English-speaking world are practically falling over each other to be on the nightly news as having committed the world's largest loss of personal data. Laptops are lost, and mailed media is missing. But are cybercriminals suddenly hugely more skillful? Have organizations, on both sides of the Atlantic, suddenly found that sensitive data is a lot more slippery? In a word: No. For as long as data has been portable, it has always gone missing. Laptops and tapes have always disappeared, and undoubtedly, Mesopotamian scribes were concerned over lost cuneiform tablets. Certainly the more convenient a storage medium and the greater its capacity, the more likely large amounts of information can be misplaced. The unfortunate impression given by the general media, if not government ... Access >>>
Premium Content for Free.
Product review: Promisec's Spectator
Endpoint security solution by Promisec
Product review: Tufin's Tufin SecureTrack 4.1
Varonis DatAdvantage product review
Varonis DatAdvantage data governance software is evaluated on its configuration and management, effectiveness, policy control and reporting.
- Product review: Promisec's Spectator
Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Netgear's Netgear FVS336G ProSafe Dual WAN Gigabit Firewall combines firewall, IPsec and SSL VPN, packaged into a small-office friendly device. Information Security magazine reviews its capabilities.
Readers' Choice Awards '08: IT Security Products of the Year
Information Security magazine's annual Readers' Choice Awards honor security software, services and products of the year in several areas: antimalware, application, email and mobile security, network access control, firewalls, remote access, firewalls, SIMs, UTM, vulnerability management, wireless, IDS/IPS, and Web gateways.
Web security gateways keep Web-based malware at bay
Web Security Gateways - A new breed of integrated technology takes Web-based malware off the menu.
- Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Interview: Arizona CISO David VanderNaalt
The CISO for the state of Arizona helps craft an executive order that prioritizes information security in every state agency.
Companies Collecting Too Much Customer Data Increase Exposure
If the risk of losing customer or partner information outweighs its value, why collect it in the first place?
Exploring Security Myths, Misconceptions that Lead to Breaches
Perspectives: Gotcha Moments
Disclosure Laws Fail as an Incentive to Secure Data
Layer8: Data Leak Fatigue
- Interview: Arizona CISO David VanderNaalt
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...