It’s Time to Join Big Tech with FIDO2-based Strong Authentication

You might also like: The Case for FIDO2: The Most Secure Option on the Market We live in perilous times, both with regards to our personal health and our online security. Similar to physical viruses l...
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

The Spoils of Ransomware: Turns out, Blockchain Is for Hackers

Ransomware, one of the most flourishing and lucrative attack forms, generally demands payment in BitCoin due to its inherent anonymity and reliability—both found in the blockchain ledger. Since it see...
Read more

GDPROI

So, in light of the growing frequency of massive breaches—at the time of this writing, Capital One’s 100M-record breach was the most recent—you’ve decided to take responsibility for the relationships ...
Read more

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, ...
Read more

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analys...
Read more

Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more in...
Read more

Three Ways to Get a Head Start in the Age of Privacy

There is a lot to think about with the impending Age of Privacy hanging over all of us. As written in Corporate Compliance Insights, there are three key steps to take when considering how to improve y...
Read more

Preparing for Stronger Data Privacy Law Based on GDPR and CCPA

Three Steps to Bolster Privacy The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) may signal a coming global standard for data protection. Why? Business. The ...
Read more

Why Mid-Size Businesses Must Have Enterprise-Grade Security

Just because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity. The percentage of mid-market businesses that have experienced a cyber-attack is up fro...
Read more