O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. The Realities of Data Loss

This chapter includes the following topics:

One Breach, Multiple Shockwaves

Insiders

Compliance Pitfall

DLP: Chasing Rainbows?

Most security organizations devote the majority of their time, attention, and resources to putting defenses in place to keep “the bad guys” out. But the ongoing need to protect against outside attackers makes it easy for organizations to lose sight of another, even more potent threat to security: the bad guys from within. Understanding which assets should be protected and who should be allowed to access them is also a complex undertaking often overlooked in the enterprise.

Industry analysts estimate that 70 to 80 percent of security breaches are caused by insiders.1 Sometimes, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required