Star 0

Abstract

Many data breach victims believe they are in isolation. To us, few breaches are unique. At any given point in time, a small number of breach scenarios comprise the incidents we investigate. The Data Breach Digest and its scenarios illustrate how breaches work, to include intrusion vectors, threat actions, targeted vulnerabilities, and prescribe a recipe for prevention, mitigation, and response.