<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4391522908329730957</atom:id><lastBuildDate>Fri, 30 Aug 2024 00:11:09 +0000</lastBuildDate><category>data breaches</category><category>information-centric</category><category>Securing data</category><category>data leakage</category><category>data-centric</category><category>PCI</category><category>data breach law</category><category>encryption</category><category>surveys</category><category>Fines</category><category>Data Privacy</category><category>FDE</category><category>cold boot</category><category>virtualization security</category><category>key management</category><category>patient records</category><category>classification</category><category>defense-in-depth</category><category>guarantee</category><category>insider threat</category><category>conference</category><category>virtualization</category><title>Data-Centric Protection and Management</title><description>Thoughts and ideas from the folks at BitArmor as we build innovative, data/information-centric, security solutions.</description><link>http://bitarmor.blogspot.com/</link><managingEditor>noreply@blogger.com (Manu Namboodiri)</managingEditor><generator>Blogger</generator><openSearch:totalResults>122</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-3112962381826029328</guid><pubDate>Tue, 12 Jan 2010 16:54:00 +0000</pubDate><atom:updated>2010-01-12T12:52:07.311-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><category domain="http://www.blogger.com/atom/ns#">PCI</category><title>BitArmor acquired by Trustwave!</title><description>Exciting news for us and pleased to announce the acquisition of BitArmor by Trustwave! The press release is &lt;a href=&quot;https://www.trustwave.com/pressReleases.php?n=011210&quot;&gt;here..&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Quick FYI - Trustwave is a leader in delivering compliance and security solutions for thousands of large and small customers across the globe. The have a great story about PCI as well. Great to be part of an awesome company!&lt;br /&gt;&lt;br /&gt;We believe this is an absolute perfect fit with our vision of information-centric security, our Smart Tag technology and how Trustwave sees the world of security and compliance.&lt;br /&gt;&lt;br /&gt;Will post more in a few days.. Lots to do so gotta run!</description><link>http://bitarmor.blogspot.com/2010/01/bitarmor-acquired-by-trustwave.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-8916357552220419494</guid><pubDate>Wed, 09 Dec 2009 17:02:00 +0000</pubDate><atom:updated>2009-12-09T12:15:03.460-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><category domain="http://www.blogger.com/atom/ns#">Securing data</category><title>New Cisco report on state of security</title><description>Cisco has just released their annual state of security report - the Cisco Annual Security Report. It mentions the normal stuff that you hear - more malware, 40% more spam in 2010, more banking trojans etc. Scary stuff, no doubt. Read more about it&lt;a href=&quot;http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=222001129&quot;&gt; here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;But the stuff that worries me is what is missing (or not highlighted) in the report - i.e. data security in the enterprise. While I, being also a consumer, appreciate the issues pointed out here, the data breached from enterprises also causes significant pain.&lt;br /&gt;&lt;br /&gt;Trojans, malware, viruses will always be around and I think we have to expect this going forward. How do we ensure that these get relegated to just annoyances and not become a security threat? This is where an information-centric approach works best - once the data is protected, only the right user opening up the document with the right application can decrypt it. The malware thus cannot access protected data since it does not have the right permissions.  This might reduce the impact of much of today&#39;s malware - at least for enterprise data.&lt;br /&gt;&lt;br /&gt;For transactional consumer data (i.e. credit card information submitted during a web session etc), we have to think of other but similar techniques...</description><link>http://bitarmor.blogspot.com/2009/12/new-cisco-report-on-state-of-security.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-7199897925841680893</guid><pubDate>Thu, 08 Oct 2009 11:53:00 +0000</pubDate><atom:updated>2009-10-08T07:59:12.409-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach law</category><category domain="http://www.blogger.com/atom/ns#">Fines</category><title>Hannaford case reversal</title><description>Some interesting developments for those who have been following the rulings in the Hannaford breach case - the judge had ruled that since cardholders were not affected economically because credit cards were stolen (banks will cover any losses to cardholders), they dont have a civil case against Hannaford.&lt;br /&gt;&lt;br /&gt;However, the judge &lt;a href=&quot;http://www.storefrontbacktalk.com/securityfraud/judge-in-hannaford-data-breach-case-reverses-himself-might-cut-through-retailers-liability-shield/&quot;&gt;recently reversed himself&lt;/a&gt; and asked the Maine supreme court whether &quot;inconvenience&quot; that the cardholders went through should be compensated... Interesting fork and one that could have strong impact to the retailers if the Maine Supreme Court indeed thinks so..&lt;br /&gt;&lt;br /&gt;The bottom line is whether retailers should take more care of data entrusted to them - while the judge had a very narrow view of &quot;loss&quot; to the consumer, the defense believes that they have a shot in making cardholder rights heard...&lt;br /&gt;&lt;br /&gt;Should be interesting to see the developments..</description><link>http://bitarmor.blogspot.com/2009/10/hannaford-case-reversal.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-4690178010915864795</guid><pubDate>Mon, 05 Oct 2009 12:07:00 +0000</pubDate><atom:updated>2009-10-05T08:12:26.988-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><title>One million dollars!</title><description>As an award that is... Express Scripts has reportedly put up $1M to anyone who can provide information leading to the arrest of those responsible. Apparently the thieves wanted to get the most from the stolen data -&lt;a href=&quot;http://online.wsj.com/article/BT-CO-20090930-717098.html&quot;&gt; sell it to the highest bidder&lt;/a&gt; or extort Express Scripts to keep it safe!&lt;br /&gt;&lt;br /&gt;Looks like extortion is the new black- from talk show hosts to stolen data! Be interesting to see where this takes the industry. But my question is - is this extortion because the criminals do not have a market demand for the stolen data? If it has a ready market, why bother with extortion?</description><link>http://bitarmor.blogspot.com/2009/10/one-million-dollars.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-4604311887353956024</guid><pubDate>Thu, 01 Oct 2009 14:16:00 +0000</pubDate><atom:updated>2009-10-01T10:35:00.726-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">FDE</category><title>Josh Corman at IANS</title><description>Just attended an interesting keynote by Josh Corman at the IANS event in Boston this morning. Very though-provoking stuff - he also has an article about it in&lt;a href=&quot;http://www.cio.com/article/499829/8_Dirty_Secrets_of_the_IT_Security_Industry&quot;&gt; CIO magazine&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Being a good marketer, Josh trimmed down the 8 secrets to 7 (but wait!, one was free and he counted from zero, so we are back to 8 :)). I had previously discussed one of his takes in &lt;a href=&quot;http://blog.bitarmor.com/2009/08/dirty-secrets-and-non-existent.html&quot;&gt;this blog&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The interesting part about listening to the discussion live, is Josh&#39;s emphasis on risk. He believes that we as security professionals have been so caught up with managing around compliance mandates, we have not stepped back to think about what risk we are mitigating.&lt;br /&gt;&lt;br /&gt;Excellent point - especially when it relates to projects on hand. Would you do disk encryption based on the knowledge that 31% of all breach incidents are the result of lost and stolen laptops? Of course you would. However, would you rethink your decision if you also know that these lost laptops account for only 9% of all data lost? Hmmm does FDE only reduce risk by 9%?&lt;br /&gt;&lt;br /&gt;That begs the question, what else reduces risk by a larger percentage? Interesting topic and subject for another post....</description><link>http://bitarmor.blogspot.com/2009/10/josh-corman-at-ians.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-4935988540129002120</guid><pubDate>Tue, 29 Sep 2009 15:12:00 +0000</pubDate><atom:updated>2009-09-29T11:22:43.566-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">PCI</category><category domain="http://www.blogger.com/atom/ns#">virtualization security</category><title>Virtualization and PCI standard - can we do better?</title><description>The wheels are turning for another version of the PCI standard. And this time &lt;a href=&quot;http://www.bankinfosecurity.com/articles.php?art_id=1815&quot;&gt;virtualization security is a big focus&lt;/a&gt; in the development of the standard. Commendable, I say. Virtualization will become a bigger deal (more than it is today) and almost all organizations will have some form of virtual environments setup.&lt;br /&gt;&lt;br /&gt;However, are we prone to repeat the same mistakes? We still seem to be stuck in the legacy world of protecting infrastructure - security professionals have no time to look beyond the normal, staple, security diet of anti-malware, IDS/IPS, firewalls etc, to where the more active threats are.&lt;br /&gt;&lt;br /&gt;How do we bring the security world (as well as the business world) forward to rethink how to enable secure business? I have strong opinions on this - I believe an &lt;a href=&quot;http://blog.bitarmor.com/search/label/information-centric&quot;&gt;information-centric security &lt;/a&gt;approach is vital and imperative in &lt;a href=&quot;http://blog.bitarmor.com/2009/07/virtualization-security-presntation-at.html&quot;&gt;virtualized environments&lt;/a&gt;. In fact, I can go so far as to say that this is the only logical and enforceable method, that enables virtualization to be all-it-can-be - so that business can be all it can be!&lt;br /&gt;&lt;br /&gt;Let not PCI be a reflection of the past threats - let it become what we need now and prepare us for the future. This is the only way it can stay relevant and useful.</description><link>http://bitarmor.blogspot.com/2009/09/virtualization-and-pci-standard.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-8687335151386910347</guid><pubDate>Fri, 18 Sep 2009 14:15:00 +0000</pubDate><atom:updated>2009-09-18T13:07:33.496-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">Fines</category><category domain="http://www.blogger.com/atom/ns#">surveys</category><title>Gartner - Pay now or pay (a lot) later!</title><description>Read a few weeks ago a very interesting (and perhaps one of the few) analyst reports that analyze the costs of a fixing a breach as compared to prevention. Check it out &lt;a href=&quot;http://www.gartner.com/DisplayDocument?ref=g_search&amp;amp;id=1151212&quot;&gt;here&lt;/a&gt;..&lt;br /&gt;&lt;br /&gt;The basic premise of Gartner analyst, John Girard, is that the costs of prevention are insignificant compared to the costs of cleanup - less than 2%! How can management of any organization look at this and say that &quot;let&#39;s cross our collective fingers&quot; and hope for the best?&lt;br /&gt;&lt;br /&gt;Data protection if done correctly, does not have to be expensive. I just read &lt;a href=&quot;http://www.mxlogic.com/securitynews/identity-theft/data-security-compliance-costs-plague-firms883.cfm&quot;&gt;this article&lt;/a&gt; based on a survey that said most organizations in MA feel that the costs of data security are hurting firms. While I agree there is an investment to be made. the costs of cleanup are far higher. In fact a recent &lt;a href=&quot;http://www.ponemon.org&quot;&gt;Ponemon report&lt;/a&gt; showed that over 60% of organizations have had breaches in the last 12 months - what this means is any organization has a 60+% chance of a breach!&lt;br /&gt;&lt;br /&gt;Any organization should at least start protecting its most vulnerable assets - data in vulnerable locations. Be it on mobile devices such as laptops, USB devices or on file shares.&lt;br /&gt;&lt;br /&gt;These costs are minimal compared to the costs of payment later...</description><link>http://bitarmor.blogspot.com/2009/09/gartner-pay-now-or-pay-lot-later.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-3524854940671006378</guid><pubDate>Tue, 15 Sep 2009 15:15:00 +0000</pubDate><atom:updated>2009-09-15T12:16:01.136-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach law</category><title>SB-20: A California refresh!</title><description>The updated California breach law, SB-20, is finally on the Governator&#39;s table. It has been a while coming and is most interesting since it finesses the grand-daddy of all breach laws, SB-1386. For more information, check out &lt;a href=&quot;http://arielsilverstone.com/privacy/california-breach-notification-law-sb-20/&quot;&gt;Ariel Silverstone&#39;s blog&lt;/a&gt;. There is a very good analysis of the new law.&lt;br /&gt;&lt;br /&gt;I like the use of the work &quot;unencrypted&quot; in the new law - implies that even if data was encrypted but the keys were lying around, you cant claim immunity :) Contrast this language with something like &quot;plain&quot; or &quot;open&quot;...&lt;br /&gt;&lt;br /&gt;I think this is a good step forward, especially around the notification, use of plain language etc. I would have liked it to be more focused on remedies and &quot;get-out-of-jail&quot; by using encryption (the MA law is one such).</description><link>http://bitarmor.blogspot.com/2009/09/sb-20-california-refresh.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-28438738133845427</guid><pubDate>Fri, 11 Sep 2009 16:56:00 +0000</pubDate><atom:updated>2009-09-11T13:04:19.910-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><title>My black-market value?  32 bucks</title><description>Interesting tool that Symantec has unveiled - an online risk calculator that figures out how much &lt;a href=&quot;http://www.everyclickmatters.com/victim/assessment-tool.html&quot;&gt;your identity could be auctioned&lt;/a&gt; off for! Apparently I am cheap and can be had for $32.29 - no idea how they got the accuracy down to 29 cents!&lt;br /&gt;&lt;br /&gt;Without going into the merits of the calculator (and the random number generator behind it :)), I think it is an interesting thought. While a criminal might not be targeting you specifically, breaching and then auctioning off thousands of such records can make someone some pretty good coin.&lt;br /&gt;&lt;br /&gt;It is also likely that the guys who breach have their specialty - getting the records. It is upto the buyer now to steal the actual cash from the accounts or credit cards that have been turned over! Specialization and job segmentation at its best!!</description><link>http://bitarmor.blogspot.com/2009/09/my-black-market-value-32-bucks.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-1439865329036814592</guid><pubDate>Sat, 05 Sep 2009 12:02:00 +0000</pubDate><atom:updated>2009-09-05T08:37:08.706-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><category domain="http://www.blogger.com/atom/ns#">virtualization security</category><title>Virtualization security compliance guidelines - quite off base!</title><description>I don&#39;t know if it is a challenge with today&#39;s compliance rules or how folks perceive virtualization security, but the recent guidelines &lt;a href=&quot;http://darkreading.com/security/management/showArticle.jhtml;jsessionid=MXBSUEWKF31ZNQE1GHPSKH4ATMY32JVN?articleID=219501096&quot;&gt;published by VMware and RSA&lt;/a&gt; seemed to have missed the mark. I don&#39;t want to add the word &quot;completely&quot;, but I do think they are quite off base.&lt;br /&gt;&lt;br /&gt;Not to say they dont have some good things in there, like platform hardening, network segmentation, change management, admin access control etc.. But this is something one would be doing for non-virtual environments as well - not much different here, just common sense.&lt;br /&gt;&lt;br /&gt;A reason for missing the mark is the non-focus on virtualizaiton itself. Virtual environments are different. I think they need some &lt;a href=&quot;http://blog.bitarmor.com/search/label/virtualization%20security&quot;&gt;fundamental rethinking of security&lt;/a&gt;, including focus on statelessness, shorter session-lifetimes and a true focus on data.&lt;br /&gt;&lt;br /&gt;What fills me with a sense of incompleteness from these guidelines is the total non-focus on data! C&#39;mon what are we trying to protect here? It&#39;s the data!! And nary a single mention?</description><link>http://bitarmor.blogspot.com/2009/09/virtualization-security-compliance.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-7533428719342582467</guid><pubDate>Thu, 03 Sep 2009 12:20:00 +0000</pubDate><atom:updated>2009-09-03T08:52:39.279-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">encryption</category><category domain="http://www.blogger.com/atom/ns#">FDE</category><category domain="http://www.blogger.com/atom/ns#">information-centric</category><title>WhoHooo! BitArmor recognized in the latest Magic Quadrant!</title><description>Apologize for getting a bit excited - BitArmor is named in the 2009 Gartner Magic Quadrant for Mobile Data Protection! The full report can be read from the &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.gartner.com/mq/index.jsp?qid=169804&quot;&gt;Gartner website. &lt;/a&gt;Our release about this recognition can be read from our &lt;a href=&quot;http://www.bitarmor.com/&quot;&gt;website&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In this blog, I usually talk about my thoughts on the industry, evolution of security etc and I don&#39;t blog much about our product and the company. However, this I do think is a good excuse to do so :) It is good to be recognized by leading security analysts as John Girard and Eric Ouellet!&lt;br /&gt;&lt;br /&gt;The report highlights our &lt;a href=&quot;http://blog.bitarmor.com/2009/08/benefits-of-information-centric.html&quot;&gt;unique information-centric security approach&lt;/a&gt; to protecting data. It also talks about our &lt;a href=&quot;http://www.bitarmor.com/guarantee&quot;&gt;No-Breach Guarantee&lt;/a&gt;. And one phrase I like is &quot;far advanced&quot; - as a way to describe our technology. Nice!&lt;br /&gt;&lt;br /&gt;Being information-centric in our approach to data protection makes us a bit different from the other vendors in the document - most of them protect mobile devices. Because of our Smart Tag technology, BitArmor is able to &lt;span style=&quot;font-weight: bold;&quot;&gt;protect the data itself&lt;/span&gt; at all times - thus the protected data can move to a laptop, USB device, via email as attachments or via FTP. It can also move from a file share to a data center server to a backup tape and still remain protected. From this perspective, we are truly fulfilling the real &quot;Mobile Data Protection&quot;. I think the naming of this Magic Quadrant report is a bit ahead of its times!&lt;br /&gt;&lt;br /&gt;However, as it stands now, most people associate data protection with &quot;mobile devices&quot; - i.e. protecting the devices that the data rests on (laptops, USBs, phones etc). And possibly for good reason - there were no good enough or usable enough technologies that could truly protect the data itself and that too persistently. Until now, of course!&lt;br /&gt;&lt;br /&gt;I do think the Mobile Data Protection Magic quadrant will evolve more towards a data or information-centric approach in the coming years. Looking forward to our footprint trending, nay jumping, up and to the right!</description><link>http://bitarmor.blogspot.com/2009/09/whohooo-bitarmor-recognized-in-latest.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-810138695106615408</guid><pubDate>Wed, 02 Sep 2009 16:29:00 +0000</pubDate><atom:updated>2009-09-02T12:42:02.243-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><title>Another case for information-centric security</title><description>The more I read about how criminals are breaching the perimeter and getting access to sensitive data in an organization, the more I am convinced an information-centirc approach is the only way to go.&lt;br /&gt;&lt;br /&gt;Case in point is the recent article from Information Week - &lt;a href=&quot;http://www.informationweek.com/news/security/attacks/showArticle.jhtml;jsessionid=J2ID5014C5D2FQE1GHOSKH4ATMY32JVN?articleID=219500335&quot;&gt;5 Security Lessons from Real World Breaches&lt;/a&gt;. Fun stuff!! Here is a short excerpt from one attack the article describes - the conclusion..&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; color: rgb(255, 102, 0);&quot;&gt;&quot;...The attackers used the compromised server as their home base. They deployed tools and scanners and spent several months meticulously mapping the network without being detected. Once they found the systems that contained &lt;span style=&quot;font-weight: bold;&quot;&gt;the data that they were looking for, they simply copied the information, put it into a Zip file, and moved it out&lt;/span&gt;.&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Emphasis above is mine - basically compromised a server and then copied data out. This data-at-rest protection being perceived as the end-all, is making me frustrated. If this data were protected using an &lt;a href=&quot;http://blog.bitarmor.com/2009/08/benefits-of-information-centric.html&quot;&gt;information-centric approach&lt;/a&gt; - i.e. protect the data and keep it protected at all times (at rest and in motion), this would have been much harder. All the criminals would have gotten is encrypted data.&lt;br /&gt;&lt;br /&gt;I am also looking at the 5 guidelines/conclusions from the report and besides a short mention of layered security and isolation, there is not much emphasis on data protection. I think the authors are missing the point. You can &lt;a href=&quot;http://blog.bitarmor.com/2009/08/dirty-secrets-and-non-existent.html&quot;&gt;never have enough perimeter security&lt;/a&gt; - IDF/IPF, anti-malware works only to a certain extent.&lt;br /&gt;&lt;br /&gt;You need to recognize that data is the critical asset,not the network or the server. Protect the data, damn it!!</description><link>http://bitarmor.blogspot.com/2009/09/another-case-for-information-centric.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-2624297993598891232</guid><pubDate>Wed, 02 Sep 2009 15:53:00 +0000</pubDate><atom:updated>2009-09-02T11:57:57.390-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach law</category><category domain="http://www.blogger.com/atom/ns#">patient records</category><title>New HIPAA breach laws taking effect</title><description>More rules and more rules... The HHS has issued final guidelines on breach notification requirements for &lt;a href=&quot;http://compliance.thompson.com/human-resources/20090901/hipaa-breach-notice-rules-take-effect-sept-23&quot;&gt;organizations under the HIPAA law&lt;/a&gt;. They take effect Sept 23rd... Just in time for the G20 summit?&lt;br /&gt;&lt;br /&gt;Maybe not. However, the reality is that organizations are having to now deal with a bevy of such requirements and the bigger problem is not in complying with basic standards, but ensuring the lowest common denominator (or in this case the strictest rules) are being met...</description><link>http://bitarmor.blogspot.com/2009/09/new-hipaa-breach-laws-taking-effect.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-9149082342981878310</guid><pubDate>Sun, 30 Aug 2009 01:19:00 +0000</pubDate><atom:updated>2009-08-29T21:37:01.095-04:00</atom:updated><title>Encrypted is not a boolean variable</title><description>&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Let&#39;s face it, encryption is a new thing, and you have to &lt;/div&gt;&lt;div&gt;keep things simple so people can understand it.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;But it frustrates me that most of the talk about &lt;/div&gt;&lt;div&gt;encryption technology, law, policy, compliance, etc is &lt;/div&gt;&lt;div&gt;always in terms of &quot;encrypted&quot; vs &quot;unencrypted&quot;.  Yeah, &lt;/div&gt;&lt;div&gt;all your data should be encrypted.  But that&#39;s the beginning &lt;/div&gt;&lt;div&gt;of the discussion, not the end.  Encryption is easy. &lt;/div&gt;&lt;div&gt;Protecting data is hard.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Once you use strong encryption to protect your data, you &lt;/div&gt;&lt;div&gt;have real security.  That sounds great, but the flipside is &lt;/div&gt;&lt;div&gt;that your company&#39;s security policy is probably a pile of &lt;/div&gt;&lt;div&gt;paper in a drawer that no one reads or updates, and does &lt;/div&gt;&lt;div&gt;not correspond to reality.  How do you organize your data, &lt;/div&gt;&lt;div&gt;backup your data, share your data, manage your data ...&lt;/div&gt;&lt;div&gt;frankly, how do you USE your data in an encrypted &lt;/div&gt;&lt;div&gt;world?  Encryption is coming.  You need to think about it &lt;/div&gt;&lt;div&gt;now.  Do your homework.  If you don&#39;t, you&#39;ll be paying for &lt;/div&gt;&lt;div&gt;your lack of preparation for years.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;-Tim&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;BTW this blog post is encrypted with no less than three &lt;/div&gt;&lt;div&gt;proprietary encryption algorithms (ROT-13^2, &lt;/div&gt;&lt;div&gt;XOR-0x00, and CAESAR-26, among others) and therefore &lt;/div&gt;&lt;div&gt;cannot be read by anyone.  &quot;encrypted == true&quot; !&lt;/div&gt;</description><link>http://bitarmor.blogspot.com/2009/08/encrypted-is-not-boolean-variable.html</link><author>noreply@blogger.com (Tim Hollebeek)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-3771622741742617055</guid><pubDate>Fri, 28 Aug 2009 15:06:00 +0000</pubDate><atom:updated>2009-08-28T11:09:55.031-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">Data Privacy</category><title>Bernanke hit by ID breach</title><description>Did the thief think he could cash into the billions that the Fed chief oversees :) Or maybe he was looking for a bailout himself!&lt;br /&gt;&lt;br /&gt;Will this put some fire under the administration to think seriously about national laws for breach? Always seems to happen when something hits close to home and personally...&lt;br /&gt;&lt;br /&gt;Interesting &lt;a href=&quot;http://www.durangoherald.com/sections/News/2009/08/28/Fed_chief__hit_by_ID_theft/&quot;&gt;news&lt;/a&gt;, nontheless...</description><link>http://bitarmor.blogspot.com/2009/08/bernanke-hit-by-id-breach.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-4585507001653507051</guid><pubDate>Mon, 24 Aug 2009 15:27:00 +0000</pubDate><atom:updated>2009-08-24T16:04:07.872-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><title>Dirty secrets and the non-existent perimeter</title><description>The perimeter is dead - long live the perimeter (the new perimeter, that is). Which obviously is the data.&lt;br /&gt;&lt;br /&gt;I am also intrigued by &lt;a href=&quot;http://www.cio.com/article/499829/8_Dirty_Secrets_of_the_IT_Security_Industry&quot;&gt;an article by Joshua Corman from IBM&lt;/a&gt;, in CIO magazine, that discusses this. Check out Dirty Secret #3. &quot;There is no perimeter&quot;. I love it. Mostly because it is true. And for some small selfish reasons as well... :)&lt;br /&gt;&lt;br /&gt;Here is what he says - very eloquently, I might add..&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; color: rgb(255, 102, 0);&quot;&gt;&quot;We need to define what the perimeter is,&quot; he said. &quot;The endpoint is the perimeter, the user is the perimeter. It&#39;s more likely that the business process is the perimeter, or the &lt;span style=&quot;font-weight: bold;&quot;&gt;information itself is the perimeter&lt;/span&gt;, too. If you design your security controls with no base assumption of a perimeter, when you have one you are more secure. The mistake we tend to make is, if we put the controls at the perimeter, then we will be fine. For many threats, we couldn&#39;t be more wrong.&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The bold emphasis above in mine - and not from Joshua. But I do it to illustrate my point (which I put forth in a &lt;a href=&quot;http://blog.bitarmor.com/2009/08/benefits-of-information-centric.html&quot;&gt;recent blog on the benefits of an information-centric security approach&lt;/a&gt; as well). Security professionals need to move beyond the perimeter and thinking that has dominated for the past 30-40 years and recognize the world is different now.&lt;br /&gt;&lt;br /&gt;For heaven&#39;s sake, the internet that allows for rapid dissemination of data and collaboration is already a teenager! Why do we still protect this environment with stuff built for the 70&#39;s?</description><link>http://bitarmor.blogspot.com/2009/08/dirty-secrets-and-non-existent.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-8705166826938779553</guid><pubDate>Sun, 23 Aug 2009 17:46:00 +0000</pubDate><atom:updated>2009-08-23T14:03:09.618-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><title>Benefits of information-centric security</title><description>For a while I have been meaning to write a short article on what I think information-centric security is - so here goes.&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Organizations have focused on securing sensitive data by protecting the infrastructure that hosts the data. This could be implemented by hosting the servers inside a data center, using firewalls and similar perimeter protection techniques to prevent external attackers, encrypting whole drives or encrypting networks. I think of these as protecting data by proxy - i.e. protect the network &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;to protect the data&lt;/span&gt;, protect the perimeter &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;to protect the data&lt;/span&gt;, protect the device &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;to protect the data&lt;/span&gt;.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Information-centric security is the concept of focusing the protection &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;on the data itself&lt;/span&gt; as opposed to the device – protection that stays with the data while at rest and while in motion. Access controls and other policies are embedded in data and follow it wherever it goes - thus enforcing these policies at the data level, regardless of where the data is.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;This approach has several advantages:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Continuous protection:&lt;/span&gt; Data always remains protected since it does not get decrypted as it moves - this has performance benefits as well as security benefits&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Device independence&lt;/span&gt;: Data can be protected regardless of the devices it rests on or travels between. For eg, it data moves to a USB device, to a backup tape, it still remains protected. No need to deploy a USB protection solution or a backup tape solution separately.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Enabling secure collaboration&lt;/span&gt;: Since the data remains persistently protected, you can share it better - the proper access controls of who can access the data remain with the data itself! Therefore data can be self-defending. No need to provide access to networks, file shares etc to share data.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Lower costs and complexity&lt;/span&gt;: all this comes down to much lower costs and complexity - no need to have multiple device or network centric products protecting data and that too by proxy..&lt;/li&gt;&lt;/ul&gt;I think the world is moving to such a method of protecting data - the old ways are untenable in today&#39;s world of exploding data and the requirements to share and collaborate.&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://bitarmor.blogspot.com/2009/08/benefits-of-information-centric.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-2361788305030958425</guid><pubDate>Tue, 18 Aug 2009 17:19:00 +0000</pubDate><atom:updated>2009-08-18T13:32:03.519-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">information-centric</category><title>The same TJX hacker?</title><description>How many more breaches were perpetrated by Albert Gonzalez? According to new charges, he is saddled with TJX (from before) and &lt;a href=&quot;http://www.wired.com/threatlevel/2009/08/tjx-hacker-charged-with-heartland&quot;&gt;now with Heartland as well as Hannaford&lt;/a&gt;! The guy has been busy, no doubt.&lt;br /&gt;&lt;br /&gt;What was it that made these breaches similar? And what did we not learn from the first ones that we let Albert and gang do it again and again?  Obviously there are many theories - but my view is, at the end of the day, infrastructure protection can get you only so far.&lt;br /&gt;&lt;br /&gt;We need an information-centric approach to protection where the focus is not on the pathways, perimeters and devices, but on the data itself. Imagine if this were the case in the above breaches, where data was stripped of networks, or from servers. If that data were protected at rest and in flight, it would not have mattered if the data were copied outside the company - it is protected! It remains encrypted!&lt;br /&gt;&lt;br /&gt;Better, more logical and more effective security. But seems like folks are still in the rush of &quot;protect the infrastructure&quot;...</description><link>http://bitarmor.blogspot.com/2009/08/same-tjx-hacker.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-1292877476829768415</guid><pubDate>Thu, 30 Jul 2009 13:39:00 +0000</pubDate><atom:updated>2009-07-30T09:55:19.968-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">information-centric</category><title>Persistent, information-centric protection, PCI and the Network Solutions breach</title><description>The more news I see regarding various breaches, the more I am convinced of the superiority of persistent and information-centric security. For example, take the &lt;a href=&quot;http://www.scmagazineus.com/Network-Solutions-was-PCI-compliant-before-breach/article/140642/&quot;&gt;latest breach&lt;/a&gt; at Network Solutions - a PCI compliant organization. Over half a million cards stolen.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Comments galore:&lt;/span&gt;&lt;br /&gt;Here is what they say &lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;&quot;The company determined that the unauthorized code may have been used by cybercriminals to capture transaction data, including customer names, addresses, and credit card numbers, and transfer it to servers outside of the company....&lt;/span&gt;&quot;&lt;br /&gt;&lt;br /&gt;Now look at the statements below from  industry experts:&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;&lt;br /&gt;&quot;...many enterprises are behind in security protection efforts such as anti-virus updates due to shrinking IT budgets, which results in unpatched vulnerabilities that are easily exploited&quot;&lt;/span&gt;&lt;br /&gt;Seems like anti-virus and unpatched systems are the main culprit - long live infrastructure protection!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;&quot;...the incident illustrates the risks of cloud computing.&quot;&lt;/span&gt;&lt;br /&gt;A broad general statement - not clear what the implication is :)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The point:&lt;/span&gt;&lt;br /&gt;My point is that the industry is so wrapped around protecting the infrastructure - i.e. protecting dat aby proxy, that they forget what it is they are really trying to protect. With an information-centric security solution, the credit card data would be protected persistently. Even if the data were to be &quot;..transferred over to servers outside the company..&quot;, it would still remain encrypted thus making it much harder for criminal organizations to obtain any value from the data.&lt;br /&gt;&lt;br /&gt;The last and best line of defense is the data - this is how layered security should be.</description><link>http://bitarmor.blogspot.com/2009/07/persistent-information-centric.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-1303133021918385616</guid><pubDate>Fri, 24 Jul 2009 14:54:00 +0000</pubDate><atom:updated>2009-07-24T11:00:53.607-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">Fines</category><title>Where does a £3M fine hurt?</title><description>Not sure, but we will know. Regulatory bodies are becoming increasingly tough on lax organizations for not protecting sensitive data - HSBC was &lt;a href=&quot;http://news.bbc.co.uk/2/hi/business/8162787.stm&quot;&gt;recently fined &lt;/a&gt;&lt;b&gt;&lt;a href=&quot;http://news.bbc.co.uk/2/hi/business/8162787.stm&quot;&gt;£3M&lt;/a&gt; &lt;/b&gt;for not adequately protecting customer records.&lt;br /&gt;&lt;br /&gt;The interesting part to notice is the fine was applied even though no customer had an unfortunate incident after the breach - I presume like a lost identity, stolen money from their bank etc.&lt;br /&gt;&lt;br /&gt;And even more interesting was that HSBC got a 30% discount for cooperating :). Good boy! &lt;b&gt;&lt;br /&gt;&lt;/b&gt;</description><link>http://bitarmor.blogspot.com/2009/07/where-does-3m-fine-hurt.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-744762861645381780</guid><pubDate>Fri, 24 Jul 2009 02:17:00 +0000</pubDate><atom:updated>2009-07-24T15:35:39.345-04:00</atom:updated><title>It&#39;s the Vision Thing, Stupid!</title><description>&lt;div&gt;Let&#39;s face it: &quot;It&#39;s the software, stupid!&quot; gets almost a million hits &lt;/div&gt;&lt;div&gt;on Google.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;And I don&#39;t want to belittle software.  Software is important. &lt;/div&gt;&lt;div&gt;Software is what processes your data, and unfortunately, software &lt;/div&gt;&lt;div&gt;is horribly badly designed and rushed to marked long before it is &lt;/div&gt;&lt;div&gt;ready.  Your data is at risk?  Blame software.  It&#39;s easy, and you &lt;/div&gt;&lt;div&gt;can be 99% sure you are right.  Those are pretty good odds.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;But think about where you were when &quot;ILOVEYOU&quot; hit.  When &lt;/div&gt;&lt;div&gt;I wrote &quot;JustBeFriends&quot;, we assumed that Microsoft would blame &lt;/div&gt;&lt;div&gt;the victim, as they had every previous time. Instead, Microsoft &lt;/div&gt;&lt;div&gt;changed direction and started caring about security.  Bad news for &lt;/div&gt;&lt;div&gt;me, good news for Microsoft.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This is a blog post.  It will not answer all your questions.  But it &lt;/div&gt;&lt;div&gt;will make the following points:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;(1) virtualization is important,&lt;/div&gt;&lt;div&gt;(2) your data is what matters,&lt;/div&gt;&lt;div&gt;(3) the world is changing,&lt;/div&gt;&lt;div&gt;(4) there are no time machines or magic wands.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;We now return you to your regularly scheduled blog.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;-Tim&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://bitarmor.blogspot.com/2009/07/its-vision-thing-stupid.html</link><author>noreply@blogger.com (Tim Hollebeek)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-1095746758623793228</guid><pubDate>Wed, 22 Jul 2009 15:50:00 +0000</pubDate><atom:updated>2009-07-22T11:54:46.946-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">information-centric</category><category domain="http://www.blogger.com/atom/ns#">virtualization security</category><title>Virtualization security - presentation at the OpenGroup Security Conference</title><description>Just presented on virtualization security and some of my thoughts on how an information-centric security approach will be absolutely essential - this is at the &lt;a href=&quot;http://www.opengroup.org/toronto2009/&quot;&gt;OpenGroup Security Conference&lt;/a&gt; in Toronto. I am putting up the slides I presented in this post.&lt;br /&gt;&lt;br /&gt;This is my first attempt at sharing slides via Slideshare - lets see how it works:&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left;&quot; id=&quot;__ss_1754084&quot;&gt;&lt;a style=&quot;margin: 12px 0pt 3px; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; display: block; text-decoration: underline;&quot; href=&quot;http://www.slideshare.net/mnamboodiri/open-group-virtualization-security-final&quot; title=&quot;Open Group Virtualization Security Final&quot;&gt;Open Group Virtualization Security Final&lt;/a&gt;&lt;object style=&quot;margin: 0px;&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=opengroupvirtualizationsecurityfinal-090722104411-phpapp02&amp;amp;stripped_title=open-group-virtualization-security-final&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=opengroupvirtualizationsecurityfinal-090722104411-phpapp02&amp;amp;stripped_title=open-group-virtualization-security-final&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;div style=&quot;font-size: 11px; font-family: tahoma,arial; height: 26px; padding-top: 2px;&quot;&gt;View more &lt;a style=&quot;text-decoration: underline;&quot; href=&quot;http://www.slideshare.net/&quot;&gt;presentations&lt;/a&gt; from &lt;a style=&quot;text-decoration: underline;&quot; href=&quot;http://www.slideshare.net/mnamboodiri&quot;&gt;mnamboodiri&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;</description><link>http://bitarmor.blogspot.com/2009/07/virtualization-security-presntation-at.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-4616567538199468283</guid><pubDate>Wed, 22 Jul 2009 15:23:00 +0000</pubDate><atom:updated>2009-07-22T11:28:26.700-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach law</category><title>The new Missouri breach law</title><description>Looks like we have state number 45 - Missouri passed a new &lt;a href=&quot;http://www.digestiblelaw.com/datasecurity/blogQ.aspx?entry=6064&amp;amp;id=34&quot;&gt;breach law&lt;/a&gt; recently and will be applicable by the end of August. Nothing earth shattering in the new law - follows pretty much the standard ones.&lt;br /&gt;&lt;br /&gt;the interesting part is they decided not to go the Nevada and Massachusetts way and look at prescribing a solution - i.e. encryption.  Does this mean there is less perceived value in what MA law is? Or are legislators are unwilling to go the extra step to enforce protection for fear of pushback?</description><link>http://bitarmor.blogspot.com/2009/07/new-missouri-breach-law.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-716634229179576190</guid><pubDate>Mon, 20 Jul 2009 14:13:00 +0000</pubDate><atom:updated>2009-07-20T10:27:18.893-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">patient records</category><title>The UCSD and Kaiser breaches</title><description>Have not talked much about any specific breach in a while, but this one caught my eye. Apparently the &lt;a href=&quot;http://www3.signonsandiego.com/stories/2009/jul/17/1m17hacker221630-hotline-ucsd-patients-swamped/?technology&amp;amp;zIndex=133482&quot;&gt;hotline for a hospital that had a breach was swamped&lt;/a&gt; with folks trying to understand what happened and whether they were at risk. UCSD had a breach of about 30,000 records, when an external attacker was able to pry through the defenses.&lt;br /&gt;&lt;br /&gt;I was beginning to get concerned that folks were not in the least (concerned that is)! Apparently they still do care when their personal information gets out there - but, as is the case all the time, it has to get personal. In fact they were concerned enough to swamp the hospital with calls!&lt;br /&gt;&lt;br /&gt;Which brings me to the benefits of small amounts of money, spent judiciously on the right security programs. Even if the cost of losing 30K records was a minimal of $30 bucks per record (including the costs of notification, credit monitoring, legal fees etc), its still nearly a whopping million dollars! A lot of moolah to be sure..&lt;br /&gt;&lt;br /&gt;Which brings me to &lt;a href=&quot;http://latimesblogs.latimes.com/lanow/2009/07/kaiser-fine.html&quot;&gt;the Kaiser breach&lt;/a&gt; - the judge saw it prudent to smack the hospital on its wrists with a fine of $187K. Not a large fine in the context of a hospital, but something to say it is serious about preventing lax management of records.</description><link>http://bitarmor.blogspot.com/2009/07/ucsd-breach.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4391522908329730957.post-2286807578169430687</guid><pubDate>Wed, 15 Jul 2009 14:59:00 +0000</pubDate><atom:updated>2009-07-15T12:25:16.487-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">information-centric</category><category domain="http://www.blogger.com/atom/ns#">surveys</category><title>New Ponemon report - little change</title><description>It is interesting to note that the more things change, the more they remain the same! the new &lt;a href=&quot;http://www.ponemon.org/&quot;&gt;Ponemon &lt;/a&gt;report is out and the numbers are interesting (but no shocking new revelations). Check out the article from &lt;a href=&quot;http://www.darkreading.com/database_security/security/encryption/showArticle.jhtml?articleID=218500434&quot;&gt;Dark Reading&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;74% of organizations had a breach in the last 12 months (the &lt;a href=&quot;http://news.prnewswire.com/DisplayReleaseContent.aspx?ACCT=104&amp;amp;STORY=/www/story/07-13-2009/0005058636&amp;amp;EDATE=&quot;&gt;PGP release&lt;/a&gt; says 85%)&lt;/li&gt;&lt;li&gt;22% had five or more breaches (and they did not have any encryption)&lt;/li&gt;&lt;li&gt;Compliance is a big driver (64% say this is why they do what they do)&lt;/li&gt;&lt;/ul&gt;One interesting nugget is the idea that encryption is becoming more strategic and folks are moving away from point solutions. I am not sure how people view the difference between point solutions and a suite of solutions :) (the latter is just a bunch of point products slapped together into an interface).&lt;br /&gt;&lt;br /&gt;I strongly believe that this device-centric approach will not get us out of this funk. Every year we have more breaches, even though adoption of encryption is getting better. Why? Poor strategies, poor management of encryption and multiple device centric solutions not really doing the job.&lt;br /&gt;&lt;br /&gt;The only way to truly protect data is with an information-centric security approach - and not focus on multiple devices, apps, file shares and now mobile devices as seen in &lt;a href=&quot;http://www.darkreading.com/database_security/security/encryption/showArticle.jhtml?articleID=218500434&quot;&gt;this article&lt;/a&gt;.</description><link>http://bitarmor.blogspot.com/2009/07/new-ponemon-report-little-change.html</link><author>noreply@blogger.com (Manu Namboodiri)</author><thr:total>0</thr:total></item></channel></rss>