Full Disclosure mailing list archives

Re: Security Breaches Pandemic (1) links


From: Paul Schmehl <pauls () utdallas edu>
Date: Mon, 26 Jun 2006 15:03:59 -0500

Al Mac wrote:
http://www.itjungle.com/tfh/tfh062606-story06.html

http://www.securitypronews.com/news/securitynews/spn-45-20060623DeloitteCallsOutTechFirmsOnSecurity.html

http://www.irishdev.com/NewsArticle.aspx?id=2902

http://www.deloitte.com/dtt/research/0,1015,sid%253D1000%2526cid%253D121102,00.html
<http://www.deloitte.com/dtt/research/0,1015,sid%3D1000%26cid%3D121102,00.html>Good articles here, in which I am merely summarizing some main points. Remember that Security Breaches have been occurring for decades. The only thing, that is relatively new, is a legal mandate to report them, when this affects residents of some USA states, and that is assuming the breached outfits even know they been breached. For most of the world, this mandate does not yet apply. So what we have recently been seeing in the news, about security breaches, is just the tip of an iceberg.

The tip of what iceberg? Since "security breach" is never defined, it's impossible to know what D/T's survey means. Are these actual breakins to machines? Do they include virus infections? Adware infections? Phishing attempts? Etc., etc.

Without defining what "security breach" means, it's useless information.

--
Paul Schmehl (pauls () utdallas edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: