Submissions

Why Data breaches happen and What can we do about it

Hygiene is hard but limits lasting damage

Accepting submissions

Not accepting submissions

Submissions must be anchored on reality and must be based on real breaches and not hypothetical ones. It should at least have one technique that was either used by the attackers to precipitate the breach or an oversight/lapse by the defenders that caused the breach. expand
  1. Submissions must be anchored on reality and must be based on real breaches and not hypothetical ones.
  2. It should at least have one technique that was either used by the attackers to precipitate the breach or an oversight/lapse by the defenders that caused the breach.
  3. Submissions must be at least 1 - 2 paragraphs and can’t be simply links without any explanation.

Hosted by

We care about site reliability, cloud costs, security and data privacy