Data Security Quotes

Quotes tagged as "data-security" Showing 1-5 of 5
Bernard Kelvin Clive
“In a digitally connected world a byte of data can boost or bite your brand”
Bernard Kelvin Clive

“... taking some precautions may attract unwanted attention and scrutiny, even if the precautions otherwise succeed in protecting your information. For example, if detected by a border agent, the fact that you wiped your hard drive may prompt the agent to ask why you did so. Even traveling without devices or data that most travelers typically have could attract suspicion and questions.”
Sophia Cope, Digital Privacy at the U.S. Border: Protecting the Data on Your Devices and in the Cloud

“In the past, security guides often suggested that it was necessary to overwrite multiple times (or “passes”). This may be true to some extent for flash media, as described below, but is apparently no longer true for traditional magnetic hard drives. See National Institute of Standards and Technology, NIST Special Publication 800-88, Revision 1. “Guidelines for Media Sanitization” (Dec. 2014) (“For storage devices containing magnetic media, a single overwrite pass with a [fixed] pattern such as binary zeroes typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data.”)”
Sophia Cope, Digital Privacy at the U.S. Border: Protecting the Data on Your Devices and in the Cloud

Kent Stern
“You should be able to reconcile past events in a matter of seconds. However, if you do not know what is or has happened, you must take an offensive posture and actively seek out those agents and transactions based on multiple dimensions over time. This is the environment in which you will work and you must build a security model that can actively detect, monitor and pursue that activity.”
Kent Stern, Obtaining Actionable Intelligence for CINDER Threat Detection using DMX Mining Models

“Currently, seven out of the ten highest valued global brands are data companies. Data as the new oil? Clearly. When you invest in data, its storage, its management and its analysis, you’re investing in innovation.”
Thomas Harrer