Fatal half-measures in incident response

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

According to our tenth annual Global Information Security Survey (GISS), conducted by PricewaterhouseCoopers, many of the 12,052 business and technology execs surveyed reported that their organizations fell victim to a wide selection of breaches.

Those breaches included data exfiltration, mobile attacks, application breaches, network breaches, successful social engineering attacks, and lost or stolen removable storage devices. "One of the things I try convince clients is that while they may not be able to prevent certain breaches, they can certainly learn to respond to breaches more proactively," Dave Shackleford, senior VP, research and CTO at IANS says.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

To continue reading this article register now

Shop Tech Products at Amazon