PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2011

Organizations need a new data security model to combat today’s threats

Information security, or a lack thereof, grabbed more than its usual share of headlines during the first half of 2011. The period was notable not just for the prevalence of network break-ins, but for the roster of marquee names that were victimized by a growing number of skilled and sophisticated attackers.  Not only did the breaches appear to be more common, they were also at organizations regarded as information security role models.  To make matters worse, the news media often reported the incidents before the individuals affected were fully informed.  With a lot of time still left on the calendar, 2011 seems likely to be remembered as the year of the data breach. The greatest challenge facing information security professionals is the nature of the attacks themselves.  The incidents that impacted Sony, Citigroup, Epsilon, RSA, and others earlier this year were not the work of hackers having fun or trying to stir up trouble. Rather, the data thefts were the work of organized, well-trained and well-funded groups with specific ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue