ContentCybercriminals move up the stack — but so does data protectionGary PalgonAugust 18, 2009Cybercriminals have approached data theft in a methodical way, starting at the bottom of the technology stack and working their way up to the top - the applications layer.