Expert: WikiLeaks complicates compliance

By , CSO |  Security, compliance, Wikileaks

"If you look at what precipitates a Wikileaks breach -- if you want to call it that -- is that a determined person downloads as much data as possible onto portable devices. One customer has us looking at all user accounts for download activity and large batches of content being assembled," Gottlieb said.

"WikiLeaks as a phenomenon won't stop, just like the more conventional data breaches, because the people behind them are too diligent and motivated," he added. "Monitoring is an important countermeasure."

Read more about data privacy in CSOonline's Data Privacy section.

Originally published on CSO |  Click here to read the original story.
Join us:






Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Answers - Powered by ITworld

Ask a Question