O'Reilly logo

Managing Risk and Information Security: Protect to Enable, Second Edition by Malcolm W. Harkins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Malcolm W. Harkins 2016

Malcolm W. Harkins, Managing Risk and Information Security, 10.1007/978-1-4842-1455-8_6

6. Emerging Threats and Vulnerabilities: Reality and Rhetoric

Malcolm W. Harkins

(1)Folsom, California, USA

Curiosity is lying in wait for every secret.

—Ralph Waldo Emerson

These days it’s hard to read an online news source, pick up a newspaper, or watch TV without seeing reports of new threats: cybercrimes, data breaches, industrial espionage, and potential destruction of national infrastructure. These reports inevitably leave the impression that we are drowning in an inexorable tide of new and terrifying threats.

One has to question how much of this is rhetoric , and how much is reality. There are political and profit-driven motives ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required