At the same time, we need lots of support and advice from businesses, academia, and government:
Most importantly, we need intelligence from cyber experts like those at the conference—details on possible suspects and victims and the tools, tactics, and procedures used in attacks.
We need companies to report incidents, even when it’s not convenient to do so. Henry said, “I know trust is an important aspect of this sharing, and I hope you continue to trust that I will maintain your confidentiality, use the information you give me wisely, and actually have an impact on the threat.”
Not convenient, or not constitutional is the question de jour when dealing with the delicate balance of information security and information privacy.
1 comment:
Today, one of the greatest marvels of our advances in information technology is the ability to connect to the Internet without slow dial-up connections, cumbersome modems, and the inconvenience of cables . Wireless technology has enabled the users of all kinds of devices–desktop and laptop computers, Personal Digital Assistants, cell phones with Internet connectivity–to get online wherever they are within range of an available network. Visit http://WiMAXWireless.com, for a complete guide to wireless technologies!
Post a Comment