Latest posts

Planning for and implementing security logging


Introduction Most data security breaches have something in common; they are not overly technical, and in most cases they could have been easily detected – far sooner than they are currently. The available evidence from forensic investigations has shown that over 40% of data breaches remain undetected for months at a time. Our collective goal […]