Studying Data Breaches

PrivacyRights.org maintains a list of publicly available information about the various forms of data breaches. Their chronologic data base is divided by the type of breach. Studying the natural evolution of cyber attacks could yield valuable information into the changes in the trend analysis of currant in-use risk mitigation techniques. As these attacks continue to evolve, so too must the risk mitigation techniques used to counter them. A federal data base, that compiles the available data from individual states to establish a national trend analysis database in real-time, would be an interesting endeavor as well.

Leave a Reply

Your email address will not be published. Required fields are marked *