Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
IT Leaders, Employees Divided on Data Security
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2019 | 11:05:38 PM
Re: Brief them properly
Definitely provides further context to the study. I still think its important to cite that different folks see things through different lenses. These differences help provide a more concrete basis to the study and in turn validate it.
DavidHamilton
50%
50%
DavidHamilton,
User Rank: Apprentice
4/30/2019 | 2:24:53 AM
Brief them properly
It is expected of employees to give their answers as such because they are not security experts. They have not been properly briefed regarding what are the risks involved during their daily work habits. They answered as such because they do not know any better.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
3/26/2019 | 9:53:45 AM
Risk Ownership
I think two facets come into play here. Ultimately, as data owners executives of said data are more heavily responsible for securing data at the company even though the data custodians (employees) directly touch said data. Due to this they way the risks more heavily and are more inclined to support data that creates a narrative that more needs to be done to secure the data. Employees on the other hand, and I believe the term is used to be department agnostic not security centric, support a business function. Many will not stop to think of the ramifications of what they are doing until they are told by a security function that it is not best practice. Due to this ignorance it is more than likely that those individuals surveyed would be inclined to think that they are not jeopardizing company data.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
3/25/2019 | 2:38:22 PM
Han Solo and Srgt. Schultz
Solp: It's not my fault.  Schultz:  I know nothing.  Of course employees are blameless, as there is that line called UNEMPLOYMENT and so they have done nothing wrong and if they did, well, it is the corp at fault because they did not provide security controls.  It was there, so, well I had to take it with me.  You never stopped me from walking into the safe (wide open anyway) and remove cash.  



Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
Google Adds More Security Features Via Chronicle Division
Robert Lemos, Contributing Writer,  2/25/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9431
PUBLISHED: 2020-02-27
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
CVE-2020-9432
PUBLISHED: 2020-02-27
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9433
PUBLISHED: 2020-02-27
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-9434
PUBLISHED: 2020-02-27
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
CVE-2020-6383
PUBLISHED: 2020-02-27
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.