__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(23, 23, 22)"},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__
  • Home
  • Office Hours
  • Straight Talk Blog
  • Contact
  • Home
  • |
  • Author:

Ideas & Insights

7 Sources of Data Breaches You’ll Never Hear About: Your Network Drives

If you think that your tangled Cat5 in the server room is a mess, ...

​Read More

Ideas & Insights

7 Sources of Data Breaches You’ll Never Hear About: Your Cloud Backup

Cloud backups are like giving your house keys to your neighbor; Except that your ...

​Read More

Ideas & Insights

7 Sources of Data Breaches You’ll Never Hear About: Your Old Windows 95 Computer

Digital pack rat: You probably have a backed-up copy of your old 256 MB ...

​Read More

Ideas & Insights

7 Sources of Data Breaches You’ll Never Hear About: Your Thumb Drive

The Law of Portable Device Breaches says that the risk of losing a device, ...

​Read More

Ideas & Insights

7 Sources of Data Breaches You’ll Never Hear About: Your Inbox

Do you really know where that 2007 list of emailed SSNs is? Licensed from ...

​Read More

Ideas & Insights

7 Sources of Data Breaches You’ll Never Hear About: Your Phone

Smart phones are now portable computers which just happen to make calls. Licensed from ...

​Read More
Load More
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(23, 23, 22)"},"f2bba":{"val":"rgba(28, 27, 29, 0.5)","hsl_parent_dependency":{"h":270,"l":0.11,"s":0.03}},"trewq":{"val":"rgba(28, 27, 29, 0.7)","hsl_parent_dependency":{"h":270,"l":0.11,"s":0.03}},"poiuy":{"val":"rgba(28, 27, 29, 0.35)","hsl_parent_dependency":{"h":270,"l":0.11,"s":0.03}},"f83d7":{"val":"rgba(28, 27, 29, 0.4)","hsl_parent_dependency":{"h":270,"l":0.11,"s":0.03}},"frty6":{"val":"rgba(28, 27, 29, 0.2)","hsl_parent_dependency":{"h":270,"l":0.11,"s":0.03}},"flktr":{"val":"rgba(28, 27, 29, 0.8)","hsl_parent_dependency":{"h":270,"l":0.11,"s":0.03}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__

Copyright 2022 Security Catalyst - Privacy policy