Expert: WikiLeaks complicates compliance

By , CSO |  Security, compliance, Wikileaks

"If you look at what precipitates a Wikileaks breach -- if you want to call it that -- is that a determined person downloads as much data as possible onto portable devices. One customer has us looking at all user accounts for download activity and large batches of content being assembled," Gottlieb said.

"WikiLeaks as a phenomenon won't stop, just like the more conventional data breaches, because the people behind them are too diligent and motivated," he added. "Monitoring is an important countermeasure."

Read more about data privacy in CSOonline's Data Privacy section.


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

Answers - Powered by ITworld

Ask a Question
randomness