LATEST POST
    FEATURE  
  Vendors to be(a)ware of
    News     
    
  
      
	   9486 views
    	9 mins	
  After it has been determined that a breach has taken place, there are various tasks that need to be done that are usually not in the sweet spot of the person that has been breached. Several vendors pretend they have a vertically integrated, one stop shop, solution. They don’t. They use third-party vendors who hide […]
    FEATURE  
  Etiology of a Breach
    News     
    
  
      
	   7506 views
    	7 mins	
  Most data breaches involve some level of victim human error, which theoretically employee training can address. Human error can take the form of clicking on a link, where the email address of the sender is unknown to the person clicking on the link. Malware then enters the scene. Another common human error scenario involves phishing […]

 
  
  
  
  
  
  
     