Dark Matters BLOG: Industry

C-Level Lessons: The Rising Cost of a Data Breach

C-Level Lessons: The Rising Cost of a Data Breach

INTRODUCTION The 2019 Cost of a Data Breach report is out and unsurprisingly the cost of data breaches has increased 12% over the last five years and now costs companies $3.92 million on average, globally; with smaller businesses being hit hardest because of lower...

Capital One Breached: Who’s in Your Wallet?

Capital One Breached: Who’s in Your Wallet?

INTRODUCTION Capital One was hacked on March 22 or 23, 2019 and no one at the company knew about it until an anonymous security researcher tipped them off, four months later. Even though the stolen information and information concerning it was posted explicitly on...

The King is Dead, Long Live Decentralized Markets?

The King is Dead, Long Live Decentralized Markets?

On May 7th, 2019 The dark web news site, Deep Dot Web had its site seized and administrators arrested through a coordinated effort with the U.S. FBI and European law enforcement agencies via Europol. The two have been charged by the U.S. with money laundering...

International Women’s Day 2019: Balance for Better

International Women’s Day 2019: Balance for Better

Each year on March 8th, the world comes together to amplify women’s successes and advocate for women’s futures. This year, the theme of International Women’s Day is Balance for Better, a campaign designed to “celebrate women’s achievements … while calling for a more...

Security is Dead. Long Live Security.

Security is Dead. Long Live Security.

A few months ago, Andy Bochman of the Idaho National Lab published a piece in Harvard Business Review with this brutal opening paragraph. It doesn’t matter how much your organization spends on the latest cybersecurity hardware, software, training, and staff or whether...

Breach Detection Times Have Not Improved

Breach Detection Times Have Not Improved

Yesterday, Ponemon released the 2016 Cost of Data Breach Global Report. The numbers are in, and unfortunately breach detection times are still extraordinarily long. According to the report, the time to identify attacks from malicious and criminal sources (which make...

A Risk Management Approach to Information Security

A Risk Management Approach to Information Security

It’s not a matter of if, but a matter of when. In fact, when discussing data breaches, it’s not a matter of when will it happen, but a matter of when did it happen. We started Terbium with the thesis that defense, while still necessary, is no longer sufficient. In...