Information security breach at 'The New York Times' is one scary story

In this week's Searchlight: a chilling information security breach at 'The New York Times', plus how 'big data' will save us all. Or maybe it won't.

No company -- no person -- is immune. When it comes to information security breaches, maybe it's best (no endorsement...

implied) to remember the motto of the security company that helped The New York Times get to the bottom of a recent attack: "The go-to people for when (not if) attacks get through." Emphasis on the "when (not if)" part.

Karen GoulartKaren Goulart

This week's SearchCIO.com Searchlight starts off with The Times' own article about the breach, a fascinating post mortem detailing a four-month infiltration of reporters' work and home computers as part of a larger campaign by the Chinese government to attack journalists. Sure, this story involves complicated international politics, but it's also a cautionary tale and a must-read on the anatomy of a hacking -- how it was stopped and why you can never, ever let down your guard.

And if that doesn't have you sufficiently shaken, read on and be freaked out by Facebook's new feature. It's not all gloom and doom, however, as we find that "big data" might finally live up to its hype by helping to save the world. Not bad!

Let us know what you think about the story; email Karen Goulart, Features Writer.

Next Steps

Security knowledge gap exposed by Myspace, Tumblr megabreaches  

Dig Deeper on Enterprise information security management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What poses the biggest threat of an information security breach at your company?
Cancel

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close