Greenlight Blog

The Top 5 Cybersecurity Breaches in 2016

The Top 5 Cybersecurity Breaches in 2016 The number of devastating cybersecurity breaches continues to rise and 2016 was no exception. It seems like every other day, the headlines pointed to another company or organization being breached. And we couldn’t escape a...

Top 5 Cybersecurity Breaches in November

Top 5 Cybersecurity Breaches in November Hackers aren’t taking a break this holiday season as we continue to read headlines of devastating breaches. Here are the top 5 breaches reported in November: Google Android: According to reports, there are now as many as 1.3...

Monitoring and Mitigating Risks

Monitoring and Mitigating Risks It wouldn’t be unusual for a large organization to have hundreds of access-risk gaps that must be investigated and assessed and whose legitimacy must be confirmed. Inevitably, you will have a subset of individuals who must have access...

Understanding Access Risks

Understanding Access Risks Risk analysis is more than simply understanding who has access to what services. It’s also about what they are doing with their access. A proper analysis of access risk enables the organization to understand the risks and prioritize...

Top 5 Cybersecurity Breaches in October

Top 5 Cybersecurity Breaches in October November is already off to a surprising start with news that another adult web site was breached, resulting in the theft of over 412 million accounts. But let’s take a step back and take a look at the top 5 breaches reported in...