Video Screencast Help

Search

Search results

Myth #5 – Classroom-format employee security education works   Origin This is another well-documented "fact" found in security textbooks that turns out to be largely false.  No one would argue that its bad thing for ...
Blog Entry by Kevin Rowney | 01 Dec 2008 | 0 comments
Myth  #4 -- Encryption as a primary effective control against data loss   Origin This myth has a long history since encryption technology predates the digital era.  Encryption, as the first choice of protection measures against data ...
Blog Entry by Kevin Rowney | 01 Dec 2008 | 0 comments
Myth #3 -- Information Classification is a necessary pre-requisite to protecting your data   Origin Not only does this myth receive strong implicit backing from many security textbooks, there's also a whole flotilla of startups ...
Blog Entry by Kevin Rowney | 01 Dec 2008 | 0 comments
Myth  #2 -- The standard model of perimeter security protects the enterprise   Origin In one sense, this is one of those myths that most practitioners already know to be false.  Wherever you look (practitioners working at large ...
Blog Entry by Kevin Rowney | 25 Nov 2008 | 0 comments
Myth #1 -- The vendor community does not solve the problems most in need of solving     Origin of this myth You hear this implicit accusation from many parties (analysts chief among them).  A typical example is in Shostack’s and ...
Blog Entry by Kevin Rowney | 25 Nov 2008 | 0 comments
Recently Hoff posted the irony-enhanced “Cloud Providers Are Better At Securing Your Data Than You Are..."  as a reaction to “The Cloud is not That Insecure”  up on GnuCitizen by PDP.   It’s tough to expect any clear and firm conclusions on ...
Blog Entry by Kevin Rowney | 24 Nov 2008 | 0 comments
There’s been a recent run of blog postings   here and here reinforcing the fundamental importance of detection accuracy in DLP.  We fundamentally agree.  Starting in 2001, and over the course of the past seven years, many of the defining ...
Blog Entry by Kevin Rowney | 30 Oct 2008 | 0 comments
On Friday I returned from a visit to the Symantec offices in Seoul, South Korea where we held a kick-off "DLP week".  I spoke with many customers and partners and gave a few interviews to the local press.  It’s interesting to see, once again, ...
Blog Entry by Kevin Rowney | 13 Oct 2008 | 0 comments
The Verizon 2008 Data Breach Investigation Supplemental Report just came out and the results shed new light on the real causes of data breach.  It's difficult to get hard evidence on what's behind the high and rising breach rates globally ...
Blog Entry by Kevin Rowney | 07 Oct 2008 | 0 comments
Last time, we talked a bit about the "New School" mode of thinking and dug into some of the publicly available numbers on data breaches. I mentioned two sources of security data and in this next post, I'll dig into the second source: DLP ...
Blog Entry by Kevin Rowney | 23 Sep 2008 | 0 comments