This is the property of the Daily Journal Corporation and fully protected by copyright. It is made available only to Daily Journal subscribers for personal or collaborative purposes and may not be distributed, reproduced, modified, stored or transferred without written permission. Please click "Reprint" to order presentation-ready copies to distribute to clients or use in commercial marketing materials or for permission to post on a website. and copyright (showing year of publication) at the bottom.
Subscribe to the Daily Journal for access to Daily Appellate Reports, Verdicts, Judicial Profiles and more...

Perspective

Aug. 9, 2013

VIDEO: Trace the evolution of data security

Over the past 20 years, we have witnessed the development of encryption and myriad other security technologies. By Rodney R. Patula


By Rodney R. Patula


"I've yet to come across a network that hasn't been breached." - Shawn Henry, former head of FBI cybersecurity investigations (Washington Post, Feb. 22).


Over the past 20 years, we have witnessed the development of encryption and myriad other security technologies. We have moved from laws focused on notifying potential identity theft victims of breaches to debates over best practices for avoiding breaches or mitigat...

To continue reading, please subscribe.
For only $95 a month (the price of 2 article purchases)
Receive unlimited article access and full access to our archives,
Daily Appellate Report, award winning columns, and our
Verdicts and Settlements.
Or
$795 for an entire year!

Or access this article for $45
(Purchase provides 7-day access to this article. Printing, posting or downloading is not allowed.)

Already a subscriber?

Enewsletter Sign-up