Listen and read

Step into an infinite world of stories

  • Read and listen as much as you want
  • Over 1 million titles
  • Exclusive titles + Storytel Originals
  • 7 days free trial, then €9.99/month
  • Easy to cancel anytime
Subscribe Now
Details page - Device banner - 894x1036

Breached!: Why Data Security Law Fails and How to Improve It

1 Ratings

2

Duration
7H 22min
Language
English
Format
Category

Non-fiction

Digital connections permeate our lives—and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.

Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through better rules and often inexpensive, non-cumbersome means. They also reveal why the current law is counterproductive. It pummels organizations that have suffered a breach but doesn’t recognize how others contribute to the breach. These outside actors include software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more.

Although humans are the weakest link for data security, the law remains oblivious to the fact that policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. This book sets out a holistic vision for data security law—one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and is designed with people in mind. The book closes with a roadmap for how we can reboot law and policy surrounding data security.

© 2022 Recorded Books (Audiobook): 9781705056271

Release date

Audiobook: March 15, 2022

Others also enjoyed ...

  1. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  2. Cybersecurity: The Insights You Need from Harvard Business Review Boris Groysberg
  3. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  4. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  5. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  6. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  7. Cybersecurity For Dummies Joseph Steinberg
  8. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  9. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  10. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  12. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  13. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  14. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  15. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  16. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  17. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  18. Cyberdeterrence and Cyberwar Martin C. Libicki
  19. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  20. Cybercrime Investigators Handbook Graeme Edwards
  21. Ransomware Protection Playbook Roger A. Grimes
  22. If It's Smart, It's Vulnerable Mikko Hypponen
  23. Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  24. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  25. The Art of Deception: Controlling the Human Element of Security William L. Simon
  26. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  27. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  28. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  29. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  30. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
  31. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  32. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
  33. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  34. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  35. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  36. Why Privacy Matters Neil Richards
  37. Profit over Privacy: How Surveillance Advertising Conquered the Internet Matthew Crain
  38. Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
  39. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  40. Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live Jeff Jarvis
  41. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
  42. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
  43. Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy George Gilder
  44. Dark Data: Why What You Don't Know Matters David J. Hand
  45. Data Science John D. Kelleher
  46. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  47. Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again Brittany Kaiser

This is why you’ll love Storytel

  • Listen and read without limits

  • 800 000+ stories in 40 languages

  • Kids Mode (child-safe environment)

  • Cancel anytime

Unlimited stories, anytime
Time limited offer

Unlimited

Listen and read as much as you want

9.99 € /month
  • 1 account

  • Unlimited Access

  • Offline Mode

  • Kids Mode

  • Cancel anytime

Try now