Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2011

Organizations need a new data security model to combat today’s threats

Information security, or a lack thereof, grabbed more than its usual share of headlines during the first half of 2011. The period was notable not just for the prevalence of network break-ins, but for the roster of marquee names that were victimized by a growing number of skilled and sophisticated attackers.  Not only did the breaches appear to be more common, they were also at organizations regarded as information security role models.  To make matters worse, the news media often reported the incidents before the individuals affected were fully informed.  With a lot of time still left on the calendar, 2011 seems likely to be remembered as the year of the data breach. The greatest challenge facing information security professionals is the nature of the attacks themselves.  The incidents that impacted Sony, Citigroup, Epsilon, RSA, and others earlier this year were not the work of hackers having fun or trying to stir up trouble. Rather, the data thefts were the work of organized, well-trained and well-funded groups with specific ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close