Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cost Of A Data Breach Jumps By 23%
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
10/16/2014 | 4:10:42 PM
Re: Downloading the Ponemon report
Sure
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/16/2014 | 4:09:10 PM
Re: Downloading the Ponemon report
That research sounds intersting, @securityaffairs. I hope you can share some of your findings with us at some point.. 
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
10/16/2014 | 9:44:43 AM
Re: Downloading the Ponemon report
Hi Marlyn, 

I'm currently working to the analysis of the cost for the data breach that impacted 80% of South Korean ... it could have a social impact of different $ Billions ... and many other incident had similar or greater impact
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/16/2014 | 9:27:13 AM
Re: Downloading the Ponemon report
I totally agree with you, @securityaffairs. These numbers give us a window into the total cost -- and probably not the whole picture. But they the trend will be continue to grow higher over time.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
10/16/2014 | 5:46:36 AM
Re: Downloading the Ponemon report
Very interesting ... but I believe that it is just the ti of the iceberg ... a serious evaluation of the cost os a data breach is quite impossible for a multitude of factor that concurs to its qualification. 

Consider that in many cases analytic data are not available ...

the figures provided give us just an excellent view of the current trend ... but I believe that cost is higher

 
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
10/15/2014 | 1:11:53 PM
Downloading the Ponemon report
Here's a URL for how to get the full report, which went live today:

http://www8.hp.com/us/en/software-solutions/ponemon-cyber-security-report/index.html?jumpid=va_mq32xtevyi
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/15/2014 | 10:46:57 AM
Re: The real cost of security
"it's easier to impose security on a more uniform environment than on a complex, heterogeneous enterprise environment."

I agree with it. Some of these problems are coming from an old system that has been forgotten and not shutdown while everybody is happy on a new environment, this simple old technology would easily bring down whole enterprise network.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/15/2014 | 10:42:39 AM
Re: Pressure points for change
I agree. At the same time, some companies do not see the pressure of regulations. If you are not in contact with the government, it is less likely you cover the expense of putting proper measures in place coming from regulations.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/15/2014 | 10:38:23 AM
too much money
It looks like however you look at it recovering from an attack is always costlier than preventing it. What is more scary is that we have been hearing these attacks lately more often than earlier in the past so there is an exponential upward trend. It is time to take put different measure such as identify who is behind and punishing them for what they did.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
10/15/2014 | 10:35:57 AM
Re: Pressure points for change
Interesting. It's too bad, though, that it still takes compliance to force their hand. There should be a more strategic view about breach inevitability. 
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16223
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16225
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16227
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute a...