11-12-2016 21:00 via feedproxy.google.com

Buying stolen data

 Should companies buy stolen data from third parties to combat credential reuse attacks against themselves? Herein we discuss the rampant, and quiet, practice of legitimate companies buying stolen data off the dark web. Read More
Read more »