Why data breaches need their own Richter scale

(Source: VentureBeat) Almost everything we do in our enterprise security programs as leaders, or consultants, or programmers, or analysts, or ethical hackers, or trainers, or company …