
Managing Cyber Risk In A COVID-19 Environment
COVID-19 has shifted the way we work. The percentage of employees teleworking now ranges from 80 – 100% in many organizations. Technology teams have been working hard to ensure they have the capability […]

Practicing Effective Cybersecurity
Cybersecurity can be a complex and overwhelming discipline. There is much written about every aspect ranging from how to effectively train your workforce to the re-identification of anonymized data to threat detection. Adding […]

Managing The Ransomware Threat
Ransomware continues to be a real threat to business operations across all industries, no organization is safe from this threat. The combination of widely available exploit kits on the dark web, limited resources […]

Risky Bits #2
Risky Bits provides a brief summary of interesting cybersecurity considerations that help to enhance the protection of data and technology. There is no shortage of cybersecurity information available on the web – vulnerability […]

CCPA: Insights Into Applicability and Preparation
The California Consumer Privacy Act (CCPA) is a new regulation on the horizon that organizations must understand and, if applicable, take action to comply. CCPA becomes effective January 1, 2020 and time is […]

Risky Bits #1
Risky Bits provides a brief summary of interesting cybersecurity considerations that help to enhance the protection of data and technology. There is no shortage of cybersecurity information available on the web – vulnerability […]

Secrets and the Use of Cloud Services
Recently a diligent security professional, Kushagra Pathak, discovered a surprising amount of sensitive data on Trello. He didn’t use an exploit kit available on the dark web, engage in social engineering or exploit […]

Decoding the Hacker Mentality to Improve Security Effectiveness – Insights from the Black Report
There are many reports and research findings on threats and breach trends. However, there are few insights into the hackers that carry out attacks. What are their motivations? What are their preferred tactics, […]

Threat Intelligence: A Path To Taming Digital Threats
Threat management continues to be a hot topic within cybersecurity, and rightfully so. Understanding the evolving technical and behavioral threat landscape and adapting mitigation controls is the key to proactive risk management. Actionable […]

Simple Steps To Prepare For GDPR
If you haven’t heard compliance with the General Data Protection Regulation (GDPR) is around the corner, and it’s not going away. As of May 25, 2018 organizations offering goods and services to EU […]