Lots of coverage on the WSJ's reporting of the breach at the Chamber of Commerce. This coincides, ironically, with Rich Mogul's column on data security. He writes: To really succeed with data security, we need a foundation of monitoring tools. If you don’t know who is using your data and how, then no amount of encryption, DRM, or filtering will ever really help. Rich goes on to recommend a combination of database activity monitoring, data leak prevention and file activity monitoring. The Chamber hack is a good example showing the need for file security that Rich articulates: The intruders used...
↧