Is your stomach turning or does it feel a calm satisfaction halfway through 2011? What seemed like a relatively calm 2011 during the first couple months has turned into a banner year of breaches. The forecast could qualify as: In like a Lamb, out like a Lion as they say. When thinking about this post and even as I started typing a couple sentences ago, I was planning on reviewing the trends of the last 6 months: looking at the 2011 Verizon Data Breach Investigations Report and how the total number of compromised records has decreased even if the number cybercrime caseloads has increased; examining some recent cloud surveys to see if security is still a top concern; reviewing the latest Ponemon Institute study which says that cyber attack and potential breach is a statistical certainty with 90% of businesses surveyed reporting at least 1 security incident over the last 12 months; the 2010 Symantec/Ponemon Data Breach Loss Report from this past March which calculated that the average cost to a company was $214 per compromised record and $7.2 million over the entire organization; a little on the rise of hactivism; along with how human behavior plays an important role in many breaches.
As I was doing a little research gathering up links, stats and other resources for this story, I ran across this chart from IEEE and I had to share it. It’s called The Two Faces of Hacking. It looks at the 25 biggest and best breach stories and maps them based on innovation and impact. I would suggest visiting the original site since there is some interaction with the chart (good, bad and neutral hacks) and links to each of the stories. Maybe I should have titled this blog, Hacks: The Good , The Bad, and The Neutral.