The Database provides comprehensive records of data breaches by date, industry, location, affected users and data, legal outcome and vectors of attack. The website also provides separate details about incidents found in the database.
Can you identify the significant common factor in these attention-grabbing headlines? Thousands of secret diplomatic communications are stolen from the US government and posted onto WikiLeaks. A powerful computer worm (dubbed “Stuxnet”) invades isolated computer networks to wreak havoc with physical machinery that drives a foreign government’s nuclear programs. The…
The road to lackluster IT performance for America’s large insurance companies was paved by the greed and shortsightedness of their CEOs. Somehow these executives perceived IT as a commodity that can be reduced at will, with no ill effect on the company.
Assuming “employees” encompass individuals working across ALL of the various functions within the organization, my question is who’s watching the watchers – the IT staff who are so focused on the threat of employee instigated security breaches?
Attempts by the federal government to constrain the collection of data, and the ability to tailor offers based on this data, is a case of the government meddling in areas where it has no place. Interference with the free market serves only to punish those companies that know how to efficiently mine their data and so is the worst form of government interference with the free market.
Cyber terrorism continues to bubble below the surface, with no large-scale effort to squash it, because there hasn’t yet been a major, defining attack.
My opinion is that ISPs should be provided with a safe-harbor exception from liability so that they can provide so-called “clean pipes” to Internet peer points. In effect, the ISPs should be able to monitor the traffic on their network for botnets and other hostile activity and disconnect these systems as a matter of daily business activity.
Michael C. Theis has more than 25 years of experience as a counterintelligence special agent and 30+ years of concurrent work in computer systems engineering. He directs cyber threat management strategies for detecting and combating trusted insider threats to the federal government and private sector. Identity Week recently spoke with…
I contend that there is no place for the concept of “trust” in IT security. Trust, as it relates to business security, is a wholly unreliable concept because of human nature and the laws of unforeseen consequences.
Now we’ll explore solutions that some of the best-managed casinos have deployed to protect their most sensitive data and IT assets.