{"id":25855,"date":"2016-05-18T17:47:48","date_gmt":"2016-05-19T00:47:48","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/05\/digital-shadows-new-tool-helps-organisations-peer-inside-data-breaches"},"modified":"2017-06-04T19:59:13","modified_gmt":"2017-06-05T02:59:13","slug":"digital-shadows-new-tool-helps-organisations-peer-inside-data-breaches","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/05\/digital-shadows-new-tool-helps-organisations-peer-inside-data-breaches","title":{"rendered":"Digital Shadows \u2014 new tool helps organisations peer inside data breaches"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/digital-shadows-new-tool-helps-organisations-peer-inside-data-breaches.jpg\"><\/a><\/p>\n<p>Hmmmmm.<\/p>\n<hr>\n<p>\u201cWe had analysts crawling all over that,\u201d says Chappell of the Hold Security cache. \u201cQuickly it was clear that a lot of those were from previous breaches.\u201d<\/p>\n<p>Anyone using this tool would have had a rapid assessment of their potential exposure. If breached data turns out to be new, the next task is to understand how it might have ended up in the hands of criminals. There are several sources for breached data including straight database theft but also phishing attacks and malware campaigns, each with its own dynamics and set of business implications.<\/p>\n<p>\u201cInstant responders are in a horrible position. They have to work out whether it [the breach] is genuine or not \u2014 Google is not effective,\u201d says Chappell.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.techworld.com\/security\/digital-shadows-new-tool-helps-organisations-peer-inside-data-breaches-3640572\/\">http:\/\/www.techworld.com\/security\/digital-shadows-new-tool-h...s-3640572\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hmmmmm. \u201cWe had analysts crawling all over that,\u201d says Chappell of the Hold Security cache. \u201cQuickly it was clear that a lot of those were from previous breaches.\u201d Anyone using this tool would have had a rapid assessment of their potential exposure. If breached data turns out to be new, the next task is to [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,34,64],"tags":[],"class_list":["post-25855","post","type-post","status-publish","format-standard","hentry","category-business","category-cybercrime-malcode","category-singularity"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=25855"}],"version-history":[{"count":3,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25855\/revisions"}],"predecessor-version":[{"id":67470,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25855\/revisions\/67470"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=25855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=25855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=25855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}