I’ve been talking to some of the folks that run security products and tools that use public breach data and research data and it seems there’s a consensus that “legitimate interest” applies to these cases. In other words, the “right to be forgotten” probably won’t apply to OSINT data and breach data collected and used by security companies and in…[Read more]
20 Years Ago, Some Hackers Visited Congress…
May 19th, 1998. I was just wrapping up my first year of college. My grades were terrible. Instead of going to classes, I had been huddled in my tiny dorm room with t
An anonymous report claims that a ton of your company’s customer data has been exposed. A sense of calm is in the air as you enact your vulnerability disclosure policy. You save the day, get a promotion and r
The Ethical Hacker Network (EH-Net) is proud to be part of the eLearnSecurity family.