Every day, we scour news feeds, blogs, and other websites looking for data breaches, new and old. We search for incidents that need to be updated, or incidents that are not yet in the database. We also provide relevant information to members of the mailing list, and Tweet out to Twitter.

News that we find in the course of searching for breaches that does not fully qualify as a breach, but that is still relevant to identity theft or data security gets added to the Blotter.