From Our Blog - InformationWeek
IoT
IoT
News
Commentary
9/29/2006
04:40 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
[Dark Reading Crash Course] Finding & Fixing Application Security Vulnerabilitie
Sep 14, 2017
Hear from a top applications security expert as he discusses key practices for scanning and securi ...Read More>>

From Our Blog

Where Did HP Cross The Line?

The leaker didn't publicize or sell HP's plans for new products, etc. He did leak very general information on corporate direction. While that may be a breach of his director's responsibilities, that's a civil matter. What HP did to find him may very well be a criminal matter under the laws of California. Yes, everything going into or out of HP on its phone lines, computers, etc., is fair game. People's personal phone records are not. --EB

HP didn't do the unethical things, the company hired to find the perpetrator did. I can assure you it didn't ask HP for permission to cross the line ... ever heard of plausible deniability? No, I don't have HP stock, nor do I work for it. I'm just sick of the double standards of the media. They'd sell their mother to get a story about how you should be hanged for selling your mother. --Critique

Why didn't they just ask board members or anyone else who had access to the leaked information? Didn't the accused board member say he would've told them he was the leaker? And did they really think that outsourcing the investigation would let them avoid prosecution? Everyone involved should be prosecuted and, at a minimum, resign. But they won't. Ms. Dunn is the sacrificial lamb. Let's face it: Business ethics are dead. --John

Quick, Encrypt Everything!

We need to make it much more expensive to lose data than it is to take care of it. It's more likely that encryption is a great immediate stopgap solution, until somebody figures out something better. But nothing will get done, because losing personal data doesn't cost enough yet. The extra cost of security in IT processes is still a lot higher than sending out those "mea culpa" letters and bogus "credit watching" services. --Ted

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll