How Much Is Your Data Worth to Hackers?

by Sarah Harvey / November 14th, 2019

How much do you think a buyer on the dark web would pay for stolen data? How much would you estimate a hacker can…

10 Most Common SOC 2 Gaps

by Sarah Harvey / November 12th, 2019

In 2019, State Farm notified policyholders of a cybersecurity attack in the form of credential stuffing, a tactic often used by hackers that relies…

Lessons Learned from the Imperva Data Breach

by Sarah Harvey / November 11th, 2019

In August 2019, a third-party bug bounty discovered a data breach that exposed email addresses, hashed and salted passwords, API keys, and TLS keys…