Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K. Welcome to Afternoon cybertea, where we explore the intersection of innovation and cybersecurity. I'm your host, Dan Johnson. From the front lines of digital defense to groundbreaking advancements shaping our digital future, we will bring you the latest insights, expert interviews, and captivating stories. To stay one step ahead. Today, I am joined by Troy Hunt, the founder of have I Been Pawned? Troy has helped the world understand data breaches in a way few others could, translating billions of compromise records into insights about attacker behavior, human weakness, and the future of security. Troy, welcome to Afternoon Cybertea. G'.
B (1:02)
Day. Thank you for having me.
A (1:03)
So your work has forced the industry to confront a really hard truth. Security often fails not because of technology that is broken, but because the technology does not work for people. And that is an important lens for our listeners, because when we strip away the headlines and we strip away the numbers, breach data is really a story about us. It is about how attackers adapt and how people keep repeating the same mistakes. Now, like me, you have seen breach data at unprecedented scale. So what do billions, and I literally mean billions of compromised records reveal about how attackers actually operate?
B (1:42)
Yeah, good question. And maybe we should begin by quantifying billions. As of the time of recording, we've got just over 17 billion breached records in this service, nearly 7 billion unique email addresses. So we're sort of two and a bit breaches for each email address. And I guess one of the things that is when someone gets breached, they usually get breached more than once. And of course, there are many, many different factors involved in that. I myself, because I've been on the Internet since the mid-90s, I have been in many dozens of data breaches. And I guess one of the things this tells us is that time on the Internet increases risks and increases likelihood of exposure. And then by having multiple breaches for each individual, the enrichment of data, for want of a better term, the sum of the parts of these different breach ends up exposing very rich data sets about individual victims.
A (2:37)
That is a really large number. And I wonder if, and maybe throughout the course of the presentation that we're talking about, if you have any context of whether the same user shows up or the same classes or the same groups of users show up repeatedly. But before we get to that, when you actually analyze this data, what is the single most frustrating human weakness you keep seeing over and over again,
