When you read about a data breach in the news, it’s usually brought to light via some external source, like a number of customers complaining their credit cards data was misused just after a purchase on your website.
The incident response team now knows there likely has been a compromise, but it’s not like there’s a giant hole in the side of a server or something to identify exactly when, where, what, and how the breach occurred. So, what exactly does a compromise look like?
from DZone.com Feed https://ift.tt/2LTU7oa
No comments:
Post a Comment