One Breach = $1 Million To $53 Million In Damages Per Year, Report Says

One Breach = $1 Million To $53 Million In Damages Per Year, Report Says


One Breach = $1 Million To $53 Million In Damages Per Year, Report Says

Posted:

InfoSec News: One Breach = $1 Million To $53 Million In Damages Per Year, Report Says: http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=226200272
By Kelly Jackson Higgins DarkReading July 26, 2010
Organizations are getting hit by at least one successful attack per week, and the annualized cost to their bottom lines from the attacks [...]

Black Hat too commercial for you?

Posted:

InfoSec News: Black Hat too commercial for you?: http://www.networkworld.com/news/2010/072610-security-conferences.html
By Tim Greene Network World July 26, 2010
Two premiere security conferences -- Black Hat and DefCon -- run back-to-back in Las Vegas this week, each with their own distinct flavor. [...]

Black Hat: Mobile Flaws Get Attention

Posted:

InfoSec News: Black Hat: Mobile Flaws Get Attention: http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=226100127
By Thomas Claburn InformationWeek July 22, 2010
At the Black Hat USA 2010 conference, July 24 - 29 in Las Vegas, mobile security won't just be over the air, it'll be in the air. [...]

[Dataloss Weekly Summary] Week of Sunday, July 18, 2010

Posted:

InfoSec News: [Dataloss Weekly Summary] Week of Sunday, July 18, 2010: ========================================================================
Open Security Foundation - DataLossDB Weekly Summary Week of Sunday, July 18, 2010
45 Incidents Added.
======================================================================== [...]

39 IOS unveils advanced cyber schoolhouse addition

Posted:

InfoSec News: 39 IOS unveils advanced cyber schoolhouse addition: http://www.afspc.af.mil/news/story.asp?id=123214901
By Capt. Carrie L. Kessler 39th Information Operations Squadron 7/26/2010
HURLBURT FIELD, Fla. -- Members of the Air Force's sole information operations and cyber formal training unit celebrated a milestone July [...]

Call for Chapter Proposals

Posted:

InfoSec News: Call for Chapter Proposals: Forwarded from: George Yee <gmyee (at) sce.carleton.ca>
Apologies for cross-posting.
Dear Colleague,
Greetings! I would like to invite you to submit a chapter proposal to a new book I am editing, entitled "Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards", assuming this topic lies within your work area. The due date for the proposal is August 15, 2010. For more details, please see the Call for Chapter Proposals at:
http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=1039694b-2c68-4e3a-8a47-39c81d938c00
Here are some excerpts from the above site:
Introduction The recent rapid growth of the Internet, together with increases in computerization, has been accompanied by soaring deployments of client-related business applications. Since business ultimately depends on the consumption of people, this has led to more and more consumer personal information in the possession of business organizations. This in turn has led to concerns over potential violations of consumer privacy. In response, various governmental jurisdictions have enacted privacy legislation to protect the privacy of consumers. However, legislation alone is not enough. Protective foolproof measures must be in place to guard against potential invasions of privacy. For example, business communication and collaboration include content sharing and email. How can these be safeguarded against the leakage of consumer personal information? As another example, internal business systems comprise workflows that handle and process client personal information. What measures are needed to avoid inadvertently and illegally revealing this information? What standards can be followed to reduce this risk?
Objective of the Book
This book will aim to deliver a coherent collection of chapters that provide significant new insights from five areas of investigation, as follows: 1) the current legal framework concerning the protection of consumer privacy in business organizations, 2) the nature and identification of consumer private information, 3) the measures and standards that can be applied and integrated within business organizations to protect consumer privacy, 4) the integration of business structures and workflows with privacy protection measures, and 5) the impacts of applying and integrating privacy protection measures on business operational and financial performance. Although theoretical and conceptual studies are equally welcome, the likely practical implications of your research should be emphasized in all contributions.
Recommended topics include, but are not limited to, the following:
Legal and compliance aspects of privacy protection in business organizations, Privacy related business standards, The nature of consumer private information in business organizations, Approaches, methods, and tools for discovering or delimiting private information, Requirements for privacy protection measures in business organizations, Privacy protection measures / privacy enhancing technologies applicable to business, Software engineering approaches for privacy protection in business organizations (e.g. design of privacy sensitive software), . Approaches, methods, and tools to assist in complying with privacy laws and regulations, Gauging the effectiveness of privacy protection measures, Approaches, methods, and tools that can be used to support the introduction of privacy protection measures, Facilitators and inhibitors of the adoption of privacy protection measures, The nature of business structures or workflows that can integrate with privacy protection measures, Protecting consumer privacy in the age of business cloud computing, Business advantages / disadvantages from the adoption of privacy protection measures, Customer responses to the introduction of privacy protection measures, Case studies of privacy protection initiatives on business performance, The impact of privacy protection measures on organizational structure and behaviour Submission Procedure
Researchers and practitioners are invited to submit on or before August 15, 2010 (let me know if you need more time), a 2-3 page chapter proposal (outline) clearly explaining the mission and concerns of his or her proposed chapter. Please email submissions (Word document) to: gmyee (at) sce.carleton.ca. Authors of accepted proposals will be notified by September 1, 2010 about the status of their proposals and sent chapter guidelines. Full chapters are expected by November 30, 2010. All submitted chapters will be reviewed between authors on a double-blind review basis.
Thank you for your consideration, and I look forward to receiving your proposal.
Sincerely, George

MoD loses a staggering 340 laptop computers in TWO YEARS...and most of them were not encrypted

Posted:

InfoSec News: MoD loses a staggering 340 laptop computers in TWO YEARS...and most of them were not encrypted: http://www.dailymail.co.uk/news/article-1296773/MoD-loses-staggering-340-laptop-computers-TWO-YEARS--encrypted.html
By Daily Mail Reporter 22nd July 2010
The Ministry of Defence has lost or had stolen 340 laptops worth more than £600,000 in the last two years, figures reveal today. [...]

0 comments:

Post a Comment