Passive Information Leakage: Losing Sensitive Business Secrets

laptop computer on the table with notepad and coffee cup with Ntrepid logo in foam

Share this post

Passive Information Leakage: Losing Sensitive Business Secrets

How PIL Works and How to Protect Yourself

On July 22 I gave a webinar on how businesses are losing sensitive information through passive information leakage (PIL). It covers the kinds of secrets that can be compromised through Passive Information Leakage (PIL), a technical discussion of how the attack works, and finally how to protect yourself against this threat. For anyone who missed it, or wants to see it again, we archived a recording of the webinar.

Passive Information Leakage – Part 5