Welcome!

Linux Containers Authors: Liz McMillan, Yeshim Deniz, Pat Romanski, Elizabeth White, Stefana Muller

Related Topics: Eclipse, Linux Containers, Containers Expo Blog, Cloud Security

Eclipse: Press Release

Data Breaches Pain IT Executives

Red Flags to Pink Slips

Jersey City, NJ, December 17, 2009 - The US unemployment rate is so high that two US Senators have introduced the Employ America Act, aiming to cut back on alien workers hired on H1-B visas. With a 10%+ jobless rate, there is a lot of talented competition for work. If an IT executive loses a job because of a data breach, he or she might be out of work for a long time—without benefits.

IT executives at ChoicePoint, Inc., looked like heroes when they reacted swiftly to a potential data breach in 2005. More often, though, leaky data pipes lead to unpleasant consequences for the executives responsible: from public outrage to protests and unemployment. HackerGuardian from Comodo helps IT executives detect and prevent catastrophic data losses.

Consequences may be light. A public outcry at the Manchester City Council followed the announcement of the loss of two laptops containing personal information of about 1700 school employees. In June, 2009, the chief executive of the English municipal council promised to encrypt information on laptops henceforth.

Students at Binghamton University protested in March, 2009, when they learned that confidential records with personally identifying information had been stored in an unlocked closet. The demanded the removal of the University's Chief Information Security Officer.

The Chief Technology Officer of AOL resigned after the public learned that the company had voluntarily released the keyword search data of more than half a million Internet users in 2005. Workers, even executives, who resign or lose their jobs for cause may be ineligible for unemployment benefits.

By contrast, executives at ChoicePoint in the same year learned that criminals had attempted to harvest personal financial information of more than 163,000 in its database. "We discovered the nefarious activities ourselves and reported them to the Los Angeles County Sheriff's Department, with whom we set up a sting operation that eventually led to the prosecution of a Nigerian crime ring," employee James E. Lee told the Harvard Business Review.

Nonetheless, the fallout was potentially embarrassing. Although ChoicePoint admitted no wrongdoing, it agreed to pay $10 million in civil penalties and $5 million in consumer redress to settle Federal Trade Commission charges that its security and record-handling practices violated consumers' privacy rights and federal laws. SC Magazine called it a "poster child for data-loss incidents."

Data leaks can either be minor public relations issues, or they can be full-blown disasters with calls for resignations and dismissals. An early warning system can make the difference. Comodo HackerGuardian scans networks at regular intervals, looking for leaks and intrusions, to help IT executives keep their networks, and their jobs, safe. To learn more, visit http://hackerguardian.com/

About Comodo
Comodo is a leading brand in Internet security, covering an extensive range of security software and services, including digital certificates, PCI scanning, desktop security, online faxing, and computer technical support services.

Businesses and consumers worldwide recognize Comodo as standing for security and trust. Comodo products secure and authenticate online transactions for over 200,000 businesses and have more than 18,000,000 installations of Comodo desktop security software, including an award-winning firewall and antivirus software offered at no charge.

The Comodo family of companies is committed to continual innovation, core competencies in PKI, authentication, and malware detection and prevention.  As a catalyst in eliminating online crime, the companies' mission is to establish a Trusted Internet.

With US headquarters overlooking Manhattan on New Jersey's waterfront, and global resources in United Kingdom, China, India, Ukraine, and Romania, Comodo products offer intelligent security, authentication, and assurance.

Comodo -- Creating Trust Online®. For more information, visit Comodo's website.

More Stories By Katharine Hadow

Katharine Hadow is a marketing communications professional in New Jersey, USA

IoT & Smart Cities Stories
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...