Discussion about this post

User's avatar
Rainbow Roxy's avatar

Love this perspective. Your thief-with-keys analogy is spot on for data extortion. It's wild how often the weakest link is just... forgotten credentials. Seems like some companies really needs to audit their old access points more often. Great read!

Expand full comment
1 more comment...

No posts

Ready for more?