How to Eliminate Security Vulnerabilities of IoT Devices

IoT devices present significant security challenges. A new joint solution from CSPi and Seceon now delivers a better way to solve these commercial IoT security vulnerabilities, and even gives MSSPs an edge over the competition with a powerful, differen… Continue reading How to Eliminate Security Vulnerabilities of IoT Devices

What You Need to Know About the Texas Consumer Privacy (TXCPA) and Texas Privacy Protection Acts (TXPPA)

Texas has two new consumer privacy and privacy protection bills on the horizon, and as you might expect they echo legislation we’ve already seen pass in California, Washington, and Massachusetts. Find out what you need to know about these latest … Continue reading What You Need to Know About the Texas Consumer Privacy (TXCPA) and Texas Privacy Protection Acts (TXPPA)

Four Ways CSPi Can Help Take Your SIEM Security Solution’s Effectiveness to the Next Level

Today, SIEM security solutions remain an important part of any company’s overall security stack. Yet there are still ways to improve your SIEM’s performance and overall value – thus increasing the effectiveness of and accelerating you… Continue reading Four Ways CSPi Can Help Take Your SIEM Security Solution’s Effectiveness to the Next Level

Why the Wendy’s Data Breach Settlement may be the Worst One Yet… And how the FTC may be Expanding its Breach Governance Approach

In September 2018, Wendy’s settled class-action lawsuits brought by financial institutions and customers whose personal information was compromised by a data breach that impacted 1,000+ of the restaurant chain’s locations. The settlements t… Continue reading Why the Wendy’s Data Breach Settlement may be the Worst One Yet… And how the FTC may be Expanding its Breach Governance Approach

Evolve or Die: Integrate Security into Application Development Processes

The first use of a factory was when Ford cranked one up to efficiently roll Model T cars into the market. It became the model of modern industry. Now the same type of mindset is taking hold in application development. The first step was the adoption of… Continue reading Evolve or Die: Integrate Security into Application Development Processes

What is California AB 375, and What Does it Mean for You?

What is the California Data Breach Notification Law (AB 375)? The threat of data breaches in the United States continues to rise, along with the potential impact on the lives of the average consumer. The state of California has led most states in enact… Continue reading What is California AB 375, and What Does it Mean for You?

What is Foreshadow, and How Can You Overcome this Vulnerability?

What is Foreshadow, and How Can You Overcome this Vulnerability? Earlier this month it was revealed that another vulnerability – the fourth – was discovered in Intel’s x86 chip architecture. Researchers in Belgium originally alerted I… Continue reading What is Foreshadow, and How Can You Overcome this Vulnerability?

The Seven Security Sessions Not to Miss at VMworld 2018

  Are you attending VMWorld 2018? If you’re attending VMWorld 2018, and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need. To help, we&… Continue reading The Seven Security Sessions Not to Miss at VMworld 2018