How PIL Works and How to Protect Yourself

On July 22 I gave a webinar on how businesses are losing sensitive information through passive information leakage (PIL). It covers the kinds of secrets that can be compromised through Passive Information Leakage (PIL), a technical discussion of how the attack works, and finally how to protect yourself against this threat. For anyone who missed it, or wants to see it again, we archived a recording of the webinar.

Passive Information Leakage – Part 5