Triangulating Beyond the Hack: Stolen Records Just One Tool in a Comprehensive Kit

Technical Hacks to Compromise Sensitive Systems Are Just One Tool in a Much Larger Toolkit

In simpler times, cybersecurity was a fairly straightforward proposition. You had your firewall, your gateway. You monitored traffic and scanned for viruses. The bad guys weren’t even always that bad, per se. Sometimes they were just there for kicks.

read more

Read more: Triangulating Beyond the Hack: Stolen Records Just One Tool in a Comprehensive Kit

Story added 10. October 2018, content source with full text you can find at link above.