Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

US Securities and Exchange Commission convenes after spate of breaches

by The Gurus
March 28, 2014
in Editor's News
Share on FacebookShare on Twitter

Revealing too much information on breaches could leave businesses vulnerable to attack.
 
According to Reuters, the US Securities and Exchange Commission (SEC) has convened after a series of high-profile data breaches which has sparked major public policy debates, including on how customers should be alerted, who should bear the cost of breaches and how such information should be disclosed both to government and the public.
 
However, companies that over share information could become targets of shareholder suits and regulatory probes. In some cases, federal law enforcement agencies like the FBI also tell companies they cannot reveal information about cyber attacks, putting public companies in a difficult position.
 
US lawmakers have been contemplating legislation to provide clarity about how notifications should be made, but so far Congress has not been able to pass any cyber security bills. Some have said that the SEC needs to do more, whether it is issuing more formal commission-level guidance or taking steps to ensure companies are disclosing more material incidents to investors.
 
Brendan Rizzo, technical director EMEA, Voltage Security, said that while companies and consumers both benefit from the increased security, with different states and different countries all having different requirements for cyber threat disclosure it is easy to see why companies and consumers alike are confused as to what laws apply in which scenarios.
 
“Consumers rightfully want to know when the sanctity of their sensitive information has been breached and, with more government and industry regulations arriving each year, it is easy to see why companies are now trying to find a data centric approach to protecting their customers’ data,” he said.
 
“Instead of building defensive barriers around silos of sensitive data, the data itself can be encrypted to protect it no matter where is goes.  When the data itself is protected, a would-be thief would only be successful in stealing useless information that does not put consumers at risk, and companies then no longer have to worry about the disclosers and possible fines they would have faced before they implemented a data-centric solution.”
 
Tom Cross, director of security research at Lancope, said: “Data breach disclosure requirements are a complex policy issue. Companies are often disinclined to disclose information about breaches because they are concerned about the negative impact on their reputations, so some regulatory requirement may be necessary. There are cases where deliberate decisions are made to keep a breach under wraps in order to prevent the attackers from knowing that their activity is under investigation.
 
“On the other hand, consumers have a right to know when their data has been compromised. Investors have a need to accurately assess the risk that a computer security event could negatively impact their investments. Furthermore, the disclosure of technical information about breaches can help organisations learn from each other’s mistakes.
 
“It is possible to craft a thoughtful approach that insures that important information eventually surfaces without compromising investigations. However, an overly strict or inflexible requirement could have negative consequences. The devil is in the details.”

FacebookTweetLinkedIn
Tags: data breach
ShareTweetShare
Previous Post

Microsoft releases DOS and Word in open source

Next Post

Whitehat's Aviator browser now available in Windows beta

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information