Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

5 Things to Know before Attending RSA Conference 2020

RSA Conference is security’s biggest event of the year, and there’s 45,000 techies landing in San Francisco to prove it. You can expect five full days of educational trainings with hundreds of expert-...
Read more

Why Every Black Person in Tech Should Attend AfroTech

It’s been a little over a week since I returned from Wakanda. No, not the fictional nation in the Marvel Comics series, but a real one. If you are familiar with Marvel's Black Panther, Wakanda is a fi...
Read more

How to Fight Breach Fatigue

The phenomenon becoming known as "breach fatigue" represents a warning against complacency with regard to the prevalence and success of data breaches.
Read more

Sharing Isn't Caring

Comfortable Breaches to Fit Any Lifestyle Do you travel? Do you prefer to drive or fly? Do you have a favorite hotel chain? Use the same entertainment methods from day to day? How long have you had th...
Read more

Cloud Vector – Cyber Illness, Infection, and How to Contain Them

Infectious Humour Humans have long had strong emotions about the sick, infirm, and deformed. The word monster derives from the Latin word for omen, originating from a time when sick and deformed child...
Read more

More Than A Meal: Cybersecurity Lessons from the Meals on Wheels National Conference

Each year, Meals on Wheels of America hosts senior nutrition and nonprofit professionals from across the country at their annual conference to convene around one thing: how to better support our senio...
Read more

A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios...
Read more

Biometrics Brings Us One Step Closer to Eliminating Passwords for Good

There are two primary means of authentication in use today: basic and multifactor. With basic authentication, the user ID and password are the most common. Recently, however, you have likely seen the ...
Read more

The 4 Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, an...
Read more