Following the news of reported suicides in connection with the Ashley Madison breach, comments from Tyler Reguly, manager of Tripwire’s Vulnerability and Exposure Research Team (VERT).
Tyler Reguly, Manager of Security Research at Tripwire :
“The Ashley Madison breach could be considered the ultimate form of cyberbullying. Suicide should not be unexpected in cases where you’ve destroyed someone’s life. In a case like this, where more than 30 million families were potentially destroyed with a single online post, you have to wonder if our current legal system is up to this challenge.
Does the intentional release of this information, knowing that it stands to destroy those involved, creating desperation and despair, really stand alongside traditional cybercrime? We’re no longer talking about a hack that has taken people’s identities, we’re talking about a hack that is taking lives. It feels like someone needs to be held accountable for this to an even greater degree than for a ‘traditional’ data breach. The problem is that we start down a slippery slope with more twists and turns that anyone dares to consider.
With major elections looming in both Canada and the United States, you have to wonder if we need to take a closer look at the abilities of our future leaders to properly guide us down this path. If more people end their lives over data breaches, how will our law makers respond? What will their next steps be? Cybercrime and cyber security are already interesting election topics but the Ashley Madison breach could make this a major campaign topic.”
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.