I see that this is posted today, what do you guys think of this 2019 wrapup? This is definitely interesting.
It’s that time of year again, time to look back on breach data from the previous year, and reflect on trends. A little history is needed before jumping in. I started cataloging breach data about 3 years ago and have tried to capture 3 critical attributes needed to understand the why and the how: How did the actor get access, why did they seek access, and what type of actor were they?
Source: 2019 Breach Trends – Based on Open Source Data
Discover more from Jared's Technology podcast network
Subscribe to get the latest posts sent to your email.