© Neil Daswani and Moudy Elbayadi 2021
N. Daswani, M. ElbayadiBig Breacheshttps://doi.org/10.1007/978-1-4842-6655-7_12

12. Technology Defenses to Fight the Root Causes of Breach: Part One

Neil Daswani1   and Moudy Elbayadi2
(1)
Pleasanton, CA, USA
(2)
Carlsbad, CA, USA
 

There are a thousand hacking at the branches of evil to one who is striking at the root.

—Henry David Thoreau, Walden (1854)

In the first chapter of this book, we focused on identifying the root causes of data breaches based on hard data from over 9,000 breaches. Then, in the first part of this book, we provided examples of mega-breaches that occurred as a result of these root causes. The root causes are phishing, malware, software vulnerabilities, third-party compromise or abuse, unencrypted ...

Get Big Breaches: Cybersecurity Lessons for Everyone now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.