Full Speed Ahead: Business-Minded I.T. Security Risk Management

"Wincup V8 Vodafone Holden Smashed.. Taken on December 4, 2010. (c) 2010 All rights reserved. Courtesy of Dhatt Creative.

Recent massive data breaches lead us to discuss the movement for new thinking, new strategies and new leadership amongst IT security. In the new paradigm, flat-out prevention is no longer the goal. Companies need to pursue nuanced risk-management decisions that protect yet allow them to do business.

Rate this:

The State of the State: U.K. Government Data Breaches

Data_Crown

Government data breaches are very much a parochial problem in the U.K., causing indignation in widespread locales. In its recently published Annual Report for 2012/13, the Information Commissioner’s Office (ICO) states that data leaks by local authorities are a priority area for the data protection body. The ICO receives both individual complaints and declarations of self-reported data breaches from public and private entities.

Rate this:

The State of the State: U.S. Government Data Breaches

"Head in Hands" by Alex E. Proimos. Shot on December 14, 2009 at Monnaie, Paris, France. Available at http://www.flickr.com/photos/proimos/4199675334/. Published under a Attribution-NonCommercial 2.0 Generic (CC BY-NC 2.0) license.

Government data breaches run the gamut, but recently we are hearing about years-old security vulnerabilities that are not discovered by the government agencies themselves, but by outsiders. Plus, a review of the broad numbers regarding U.S. government data breaches of the past four years.

Rate this:

How and Wow: Verizon’s Tactical Survey of Global Data Breaches

Designer: Thomas Saur. Available at http://wall.alphacoders.com/big.php?i=10203.

What is really happening on the ground with data breaches globally? The Verizon “2013 Data Breach Investigations Report” aggregates and analyzes data from over 47,000 data security incidents and 621 confirmed data breaches. Read this summation to acquaint yourself with the Report’s telling details, unexpected correlations and promising strategies for detection and prevention.

Rate this:

  • Blog authors

  • Copyright notice

    © Copyright 2010-2014 "Information Security Breaches & The Law".
    All rights reserved, unless noted otherwise under each author's post, page or other material.
    If you would like to discuss licensing terms, contact us at: info [at] security-breaches [dot] com.

  • Enter your e-mail address here to follow this blog and receive notifications of new posts by e-mail.

  • The “Global Information Security Breach Professionals” Group on Linkedin

  • Wordpress Blog Stats

    • 32,819 hits
Follow

Get every new post delivered to your Inbox.

Join 454 other followers