Searched for: "anatomy of a data breach"
About 4 results for "anatomy of a data breach"
The current trend in class-action litigation makes thinking like a litigator imperative when working on what to do before and if a data breach occurs.
Exclusive: Inside the ProtonMail siege: how two small companies fought off one of Europe's largest DDoS attacks
What started as a simple digital ransom quickly escalated into a trans-continental networking battle.
Audit logs are not really practical for security auditing but can be invaluable in troubleshooting DHCP server-related issues. In this article, Brien Posey discusses the anatomy of a DHCP server audit...
Event logs can provide clues to the cause of a server problem; you just need to know what information to look for and how to interpret it. Brien Posey explains how to sort through event-log data and g...