<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Thresholds and Scale of Identity Fraud</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=256" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=256</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=256&#038;cpage=1#comment-348</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Fri, 09 Nov 2007 15:51:58 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=256#comment-348</guid>
		<description><![CDATA[@Dan -

If your point is that the extra attention placed on huge breaches ends up reducing the risk to any individual, it is certainly an interesting one. I think that was something Chris Walsh brought up during the VA breach discussion, and I&#039;ve discussed it as well.

I am a bit skeptical, however, that we can really do anything in the recovery/response phase of a breach that would lead to the 25x improvement suggested by the difference. I think it is simply due to the abundance of records available.

The other thing that got brought up was the length of time that someone has to compromise the IDs...
]]></description>
		<content:encoded><![CDATA[<p>@Dan -</p>
<p>If your point is that the extra attention placed on huge breaches ends up reducing the risk to any individual, it is certainly an interesting one. I think that was something Chris Walsh brought up during the VA breach discussion, and I&#8217;ve discussed it as well.</p>
<p>I am a bit skeptical, however, that we can really do anything in the recovery/response phase of a breach that would lead to the 25x improvement suggested by the difference. I think it is simply due to the abundance of records available.</p>
<p>The other thing that got brought up was the length of time that someone has to compromise the IDs&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dan Weber</title>
		<link>http://spiresecurity.com/?p=256&#038;cpage=1#comment-347</link>
		<dc:creator>Dan Weber</dc:creator>
		<pubDate>Fri, 09 Nov 2007 15:37:33 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=256#comment-347</guid>
		<description><![CDATA[This is pretty much the textbook case of &quot;misery loves company.&quot;

If a million people get their data stolen, someone is going to do something about it without you needing to do something.

If a hundred people get their data stolen, it&#039;s probably up to you.


]]></description>
		<content:encoded><![CDATA[<p>This is pretty much the textbook case of &#8220;misery loves company.&#8221;</p>
<p>If a million people get their data stolen, someone is going to do something about it without you needing to do something.</p>
<p>If a hundred people get their data stolen, it&#8217;s probably up to you.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
