News & Information for Technology Purchasers NewsFactor Sites:     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note
Fiercely productive scanners
Average Rating:
Rate this article:  
75% of Breaches Financially Motivated, 20% Are Espionage
75% of Breaches Financially Motivated, 20% Are Espionage

By Jennifer LeClaire
April 23, 2013 11:21AM

    Bookmark and Share
"The bottom line is that, unfortunately, no organization is immune to a data breach in this day and age," said Wade Baker, principal author of the Verizon 2013 Data Breach Investigations Report. "We have the tools today to combat cybercrime, but it's really all about selecting the right ones and using them in the right way."

(Page 2 of 2)

"We see the level of sophistication and organization rapidly increasing, and for the most part, are unable to cope with the emerging threat they pose. What worries corporations and governmental entities is the level of risk offered by state-sponsored groups," Pickering said.

"They have resources and skills to pull off large-scale IP theft, which first gained public media attention though the Aurora hack in 2009. And that threat hasn't lessened over time. If anything, it's more prevalent. It also shows us that companies with intellectual property have a lot to lose. We're not just seeing fraud attacks anymore, but skilled exfiltration of this country's corporate secrets."

Jim Butterworth, chief security officer at HBGary, is not surprised that the number of incidents is going up. He told us people are still using antiquated indicators or signature-based solutions to find tomorrow's threat.

"The attackers are creating malware using custom code that can't be detected by IOCs or anti-virus," Butterworth told us. "Targeted attacks are not like a computer virus that can be handled like a cyber-housekeeping duty. Instead, organizations need to invest in technology, people and processes to respond quickly to these types of threats."

A Sobering State of the Union

We also spoke with Ori Eisen, founder, chairman and CIO of 41st Parameter, about the study. He said the report is sobering and reflects the state of the union.

"It manifests the prediction that in due time, the network itself will become the weakest link, based on the core technology it is built on, namely, the TCP/IP protocol," Eisen said. "When the Internet began in the mid-'90s, budding e-commerce players jumped in. There was a period of trepidation and wait-and-see attitude in corporations to see if this was a fad or a trend."

Eisen said we've all since jumped in -- and the warnings of 20 years about security and what could happen have been lost in the shuffle. As he sees it, the 2013 report is a reminder that without ample security layers on top of the inherently insecure TCP/IP protocol -- any online estate is exposed.

What's more, he said, the scale and growth of DDoS and other breaches tells us that there is a need for a more secure network, which will have a different underpinning -- this time, with security built-in from the ground up.

"Until then, executives who read the report should ask themselves if they have fortified their online estate to the maximum possible, given the state-of-the-art tools that are commercially available," Eisen said. "These include a security and fraud detection system that detects the four main touch points of the digital consumer journey: account opening/registration, account log-in/authentication, account takeover, and transactional anomaly detection.

"With device intelligence and a layered fraud solution even when credentials are breached, their customers remain protected."

< Previous Page  |  1  |  2


Tell Us What You Think


APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.

1.   Online Access for the Deaf and Blind
2.   Vaio Fit Battery Danger Forces Recall
3.   Drop in Global PC Shipments Slows
4.   Fast Seagate 6 TB Drive for Data Center
5.   Broadcom Upgrades Its SDN Hardware

Online Access for the Deaf and Blind
Pilot program provides technology tools.
Average Rating:
Fast Seagate 6 TB Drive for Data Center
Can use 12 Gb/s SAS interface.
Average Rating:
Sony Digital Paper Cuts Paper Waste
High price justifiable for business.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
Canadian Teen Arrested for Heartbleed Hack
One week after the OpenSSL Heartbleed vulnerability was unveiled, Canadian authorities have made the first arrest -- a London, Ontario teenager -- connected to exploiting the security hole.
IBM Offers Security, Disaster Recovery as SoftLayer Service
New disaster recovery and security services for SoftLayer clients are being added by IBM. Big Blue said the new capabilities will speed cloud adoption by alleviating concern over business continuity.

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.

Mobile Technology Spotlight
Google Releases Chrome Remote Desktop App for Android
You're out on a sales call, and use your Android mobile device to grab a file you have back at the office on your desktop. That's a bit easier now with Google's Chrome Remote Desktop app for Android.
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 billion, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.

NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.