Why outsourcing your DPO role is an effective insurance policy

Organizations are starting to take a much more considered approach to data protection as high-profile regulatory action for data mishandlings has raised both the stakes and interest in data privacy operations. Since the EU General Data Protection Regul… Continue reading Why outsourcing your DPO role is an effective insurance policy

California’s IoT cybersecurity bill: What it gets right and wrong

California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT security. But as the law went into effect at the start of the year, they will also (u… Continue reading California’s IoT cybersecurity bill: What it gets right and wrong

Smart cities are on the rise, what are the dangers?

A combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds of the global population will be living in cities, up from just over half cur… Continue reading Smart cities are on the rise, what are the dangers?

Burner phones are an eavesdropping risk for international travelers

In recent years, burner phones have become an obligatory part of the international business traveler’s toolkit. But though these devices are designed to minimize the amount of stored data available for capture by malicious actors in a foreign country, … Continue reading Burner phones are an eavesdropping risk for international travelers

Data ownership vs. data processing: A moral dilemma?

Work around data seems to never end. Between collection, sharing and use – the burden of this falls onto the shoulders of the CISO, the broadness of which, seems to be increasing year-on-year. The question that must be asked is, can we expect the… Continue reading Data ownership vs. data processing: A moral dilemma?

Modern security product certification best practices

IT security product manufacturers are required to achieve government mandated, standards-based certifications to get their product in market. One of the most common, aptly called Common Criteria (CC), was introduced more than two decades ago to help st… Continue reading Modern security product certification best practices

Planning for 2020? Here are 3 cybersecurity trends to look out for

It’s almost 2020, which means teams are finalizing cyber budgets, strategies and goals. However, as you’re preparing for the new year, it’s important to keep an eye out for how the cybersecurity landscape might shift in 2020. From the rise in investor … Continue reading Planning for 2020? Here are 3 cybersecurity trends to look out for

The privacy and security trends that will shape 2020

Privacy concerns will ratchet up further around IoT and 5G. Even if the industry manages to secure the billions of IoT devices already deployed, they permeate so many aspects of life that it will be nearly impossible to keep personal and private inform… Continue reading The privacy and security trends that will shape 2020

The importance of proactive patch management

IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams know where they may be vulnerable so they can take action, also lets attacke… Continue reading The importance of proactive patch management

2020 is prime for a global building cybersecurity standard

Buildings will account for 81% of all connected things in 2020, ushering in a new era of smart office buildings, schools, hospitals and more that will improve efficiencies for building management and provide a more comfortable experience for occupants…. Continue reading 2020 is prime for a global building cybersecurity standard