SANTA CLARA, Calif. — When it comes to cybersecurity, there are two strategies. The first is reactive and is put into motion once security protocols have failed. The second, the proactive approach, can take you down the proverbial rabbit hole and into a world of intelligence gathering that puts you across the virtual table from those who might be coming for your secured data.
At least this is how Alert Logic’s Stephen Coty described the strategy options to attendees of the 17th Cloud Expo this week.
The longtime cybersecurity expert warned that system breaches are not the only threats posed by those with access to sensitive information.
He used the case of the recent Ashley Madison breach, in which the emails of users were compromised, as an example of how a bad actor could leverage an employee’s organizational data as a tool for blackmail. For the full article click here
from cyber security caucus http://ift.tt/1S1tnLs
via IFTTT
No comments:
Post a Comment