May 18, 2016
Digital Shadows — new tool helps organisations peer inside data breaches
Posted by Karen Hurst in categories: business, cybercrime/malcode, singularity
Hmmmmm.
“We had analysts crawling all over that,” says Chappell of the Hold Security cache. “Quickly it was clear that a lot of those were from previous breaches.”
Anyone using this tool would have had a rapid assessment of their potential exposure. If breached data turns out to be new, the next task is to understand how it might have ended up in the hands of criminals. There are several sources for breached data including straight database theft but also phishing attacks and malware campaigns, each with its own dynamics and set of business implications.
Continue reading “Digital Shadows — new tool helps organisations peer inside data breaches” »