Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to ransomware attacks on CMA and CGM, the last two years have been saturated by headlines of cybersecurity mishaps. Yet, despite the prevalence of the breach-centric news cycle, many people may not know what exactly data breaches are, how they typically start, and why they occur. According to IBM, the average time it takes to identify that a breach has occurred is 287 days, with the average time to contain a […]