Friday, February 3, 2023
  • Anker’s Eufy Admits ‘Lie’ After TWO Months — Still no Apology
  • USENIX Security ’22 – Chong Xiang, Saeed Mahloujifar, Prateek Mittal – ‘PatchCleanser: Certifiably Robust Defense Against Adversarial Patches For Any Image Classifier’
  • What are Software Audits and Why are They on the Rise?
  • CyRC Special Report: How companies fared in the aftermath of Log4Shell
  • Businesses Bolster Defenses as Data Breach Concerns Grow

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security Security Bloggers Network 

Home » Cybersecurity » Data Security » You: The First, Last and Best Data Protection and Privacy Defense – Part 1

SBN

You: The First, Last and Best Data Protection and Privacy Defense – Part 1

by Tripwire Guest Authors on August 19, 2018

If you have followed our work for any amount of time, you will note that we are fans of certain information security technologies such as encryption, AI and machine learning as well as blockchain. But you will also note we are very specific, cautious and surgical about their use. Encryption is a must-have but does little for you if your underlying systems or habits are vulnerable. Think keyloggers, poor handling of encryption keys and using encryption to transmit but not for storage. AI and machine learning are wonderful for sifting through mountains of data to find those data packets that just seem out of place but not so great when used to filter and even block content or to fully remove human decision-making from the process. Blockchain is a revolutionary technology that can really change how we do business, but unfettered faith in it – much like any other technological wizardry – will not lead us to the peaceful and serene abode of cybersecurity, network security, information security, data security or whatever you would prefer to call it.

TechStrong Con 2023Sponsorships Available

You see, here is the problem with all of these technologies: they do not cure the problems caused by the operator, otherwise known as “you.” At best, they only treat the problems the operator is responsible for. Pick your study over the last few years, and you will find that human error is responsible for 85%-95% of cybersecurity and privacy breaches. Based on those findings, we are going to go out on a limb here and say this: you (okay we, to be fair) are the problem. Always have been, always are, always will be. Everything else is just fog, playful squirrels distracting us, and cute cat videos.

This two-by-four-smack-to-the-forehead fact should be enough evidence to make us pause and (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/you-the-first-last-and-best-data-protection-and-privacy-defense-part-1/

August 19, 2018August 19, 2018 Tripwire Guest Authors data protection, Featured Articles, IT Security and Data Protection, people, Privacy
  • ← Liar, liar, pants on fire! Barclays phish claims cards explode
  • ICS Security in the Age of IT-OT Convergence →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

Another Password Manager Leak Bug: But KeePass Denies CVE
‘Finish Him!’ US Kills Huawei With Final Tech Ban
Security, Compliance Risks Complicate Cloud Migration Efforts 
QKD: The Key to a Resilient Future
Why Traditional Approaches Don’t Work for API Security
Six reasons why FedRAMP® matters to more than just the Feds
What is Red Teaming?
Sectigo Announces Further Advancements to Industry-Leading CLM Platform
ChatGPT Makes Waves Inside and Outside of the Tech Industry
Illicit Telegram Groups: A New Dark Web Frontier?

Upcoming Webinars

Mon 13

AI in Machine Learning

February 13 @ 1:00 pm - 2:00 pm
Wed 15

Understanding Cyber Insurance Identity Security Requirements for 2023

February 15 @ 11:00 am - 12:00 pm
Wed 15

Where Will DevSecOps ‘Shift’ Next?

February 15 @ 1:00 pm - 2:00 pm
Tue 21

Headwinds, Crosswinds and Tailwinds: Securing the Cloud in Turbulent Times

February 21 @ 1:00 pm - 2:00 pm
Wed 22

Best Practices to Secure Your Software Supply Chain

February 22 @ 1:00 pm - 2:00 pm
Tue 28

SaaS-Based Container Networking and Security on Amazon EKS

February 28 @ 11:00 am - 12:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

Anker’s Eufy Admits ‘Lie’ After TWO Months — Still no Apology
Analytics & Intelligence API Security Application Security Cloud Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Endpoint Featured Humor Identity & Access Incident Response Industry Spotlight IOT IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Anker’s Eufy Admits ‘Lie’ After TWO Months — Still no Apology

February 3, 2023 Richi Jennings | 45 minutes ago 0
‘Finish Him!’ US Kills Huawei With Final Tech Ban
AI and Machine Learning in Security AI and ML in Security Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Industry Spotlight IOT IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Regulatory Compliance Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Finish Him!’ US Kills Huawei With Final Tech Ban

February 1, 2023 Richi Jennings | 1 day ago 0
US No-Fly List Leaked via Airline Dev Server by @_nyancrimew
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

US No-Fly List Leaked via Airline Dev Server by @_nyancrimew

January 23, 2023 Richi Jennings | Jan 23 0

Top Stories

Businesses Bolster Defenses as Data Breach Concerns Grow
Cybersecurity Data Security Featured Incident Response News Security Boulevard (Original) Threat Intelligence 

Businesses Bolster Defenses as Data Breach Concerns Grow

February 3, 2023 Nathan Eddy | 4 hours ago 0
AI, Processor Advances Will Improve Application Security
Application Security Cybersecurity Featured Malware News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence 

AI, Processor Advances Will Improve Application Security

February 2, 2023 Michael Vizard | Yesterday 0
OpenSSF Head Delivers AI Warning for Application Security
Application Security Cybersecurity Featured News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

OpenSSF Head Delivers AI Warning for Application Security

February 2, 2023 Michael Vizard | Yesterday 0

Security Humor

Anker’s Eufy Admits ‘Lie’ After TWO Months — Still no Apology

Anker’s Eufy Admits ‘Lie’ After TWO Months — Still no Apology

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.