Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Christine Fulgham (christineopensecurityfoundation.org)
Date: Mon Oct 11 2010 - 20:11:24 CDT
The very nature of data security is one couched in discretion: As a matter
of routine, processes are classified, and specialists in this area rarely
share their company’s state secrets.
Against the premise that the very nature of data security and its associated
risks keep organizations from sharing critical solution steps, insurance and
financial services organizations lack the metrics and raw collection
capabilities necessary to objectively measure and manage this growing
So say the authors of a new report
on the “2010 Data Security Survey” published by Phoenix-based
The report is designed as an early step toward providing security managers
and practitioners with practical information on the perceived effectiveness
of major data security tools and techniques. The results are based on the
responses of more than 1,000 security and IT professionals within
organizations of all sizes and with a heavy emphasis on financial services
and including health insurance as its own category.
“There is a huge gap in the security industry, forcing us to rely more on
anecdote and perceptions than hard measurements,” notes the report. The
study also notes some disparities between the common perception that
security breaches are on the rise and the reality of breach incidence.
"Nearly two-thirds of organizations either didn't know if they suffered any
data breach incidents, or stated that they didn't experience any," the
survey says. "Of those that did, 46% saw a decline in breaches, while 27%
reported the same number of breaches from the previous year."
The survey results indicate that organizations do not invest equally in data
security- ﬁnancial services and government invest most in data security
personnel, with healthcare, retail, and manufacturing investing relatively
less (note that the authors only performed this analysis for some of the
Other Key Findings
Dataloss Mailing List (datalossdatalossdb.org)
Archived at http://seclists.org/dataloss/
Take CREDANT Technologies short survey on cloud usage and security.
Take the survey: http://www.surveymonkey.com/s/TXDR7WT
Respond by October 12, 2010.
Enter to win a $500(US) Amazon Gift Card.