Privacy and can experience tension at a number of points in the . Here are seven – plus some possibilities for easing the strain.
Previous  - slideshow arrow gray left - 7 Places Where Privacy and Security Collide

1 of 8

Next  - slideshow arrow black right - 7 Places Where Privacy and Security Collide

(Image: Joyseulay)  - Image 1 - 7 Places Where Privacy and Security Collide

In a recent interview with Dark Reading, Cisco chief privacy officer Michelle Dennedy said that privacy was all about the contents of the metaphorical pipe, while security concerned itself with the architecture of the pipe. For IT security professionals, issues arise when protecting the contents of the pipe, and the pipe itself, create tensions in how security operates.

There are a number of points at which these tensions arise in the “privacy versus security” dance. One of the most visible twirls around it is the topic of encryption, which can be used to both protect the privacy of individuals and shield the true nature of .

But that’s not the only place where the needs of privacy and security can collide. Here, we take a look at seven — and want to know about others you have encountered. At which points have you seen privacy and security considerations collide? Let us know in the comments, below.

Why Cybercriminals : A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this event.

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Previous  - slideshow arrow gray left - 7 Places Where Privacy and Security Collide

1 of 8

Next  - slideshow arrow black right - 7 Places Where Privacy and Security Collide

More Insights



Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here