Audiobook7 hours
Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition
Written by Daniel J. Solove and Woodrow Hartzog
Narrated by Jim Frangione
Rating: 5 out of 5 stars
5/5
()
About this audiobook
Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security
laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through better rules and often inexpensive, non-cumbersome means. They also reveal why the current law is
counterproductive. It pummels organizations that have suffered a breach but doesn’t recognize how others contribute to the breach. These outside actors include software companies that create vulnerable software, device companies that make insecure devices,
government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more.
Although humans are the weakest link for data security, the law remains oblivious to the fact that policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. This
book sets out a holistic vision for data security law—one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and is designed with people in mind. The book closes with
a roadmap for how we can reboot law and policy surrounding data security.
laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through better rules and often inexpensive, non-cumbersome means. They also reveal why the current law is
counterproductive. It pummels organizations that have suffered a breach but doesn’t recognize how others contribute to the breach. These outside actors include software companies that create vulnerable software, device companies that make insecure devices,
government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more.
Although humans are the weakest link for data security, the law remains oblivious to the fact that policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. This
book sets out a holistic vision for data security law—one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and is designed with people in mind. The book closes with
a roadmap for how we can reboot law and policy surrounding data security.
Related to Breached!
Related audiobooks
They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy Rating: 4 out of 5 stars4/5Why Privacy Matters Rating: 0 out of 5 stars0 ratingsExploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsCyber Privacy: Who Has Your Data and Why You Should Care Rating: 2 out of 5 stars2/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsObfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5The Flow of Illicit Funds: A Case Study Approach to Anti–Money Laundering Compliance Rating: 0 out of 5 stars0 ratingsWe Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsOur Data, Ourselves: A Personal Guide to Digital Privacy, First Edition Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsFacing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5Profit over Privacy: How Surveillance Advertising Conquered the Internet Rating: 0 out of 5 stars0 ratingsDuty of Care: An Executive Guide for Corporate Boards in the Digital Era Rating: 4 out of 5 stars4/5Alice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCustomer Data and Privacy: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5
Security For You
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 5 out of 5 stars5/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5
Reviews for Breached!
Rating: 5 out of 5 stars
5/5
1 rating0 reviews