top of page

Attacker compromises information of 250K in Bailey’s data breach

This article details a reported breach of the e-commerce site,  The scariest part – it began in 2011 and has proceeded unnoticed until now.  This is a perfect example of why auditing is necessary, why logging and log review is necessary, and frankly why IT security in general is necessary.  I am not saying any of these controls or methodologies would have stopped the breach, but I would like to think that it would have been discovered long before now.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d

bottom of page