The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after all, things th… Continue reading A Cyber Executive Order For the 21st Century
Healthcare security today is extremely complex due to the integrated clinical systems and connected community networks. As well, no longer are the medical records stored with a single provider.
The post CISO Stories Podcast: Effective Health Care… Continue reading CISO Stories Podcast: Effective Health Care Security is More Than HIPAA
Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data c… Continue reading How to Protect Structured and Unstructured Data
In United States v. Carpenter, the United States Supreme Court ruled that, before the police could obtain historical cell site location information (CSLI) about the location of someone’s cell phone in the past, they had to seek and obtain a warrant fr… Continue reading Federal Court Narrows ‘Third Party’ Warrant Requirement
Do you ever feel like someone might be viewing your online activity when you are connected to public Wi-Fi? Well, that is fair given the kind of forces arrayed against your privacy. The good thing is that with a virtual private network (VPN), you can p… Continue reading Why VPN Is Vital in Securing Your Online Privacy
“Click here to claim your bonus pay,” said email from a British train company. But it was a phishing test—and now the staff are hopping mad.
The post Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues appeared first on Security Boule… Continue reading Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues
Recently, the Washington, D.C. police department suffered a ransomware attack when the Babuk Group gained access and encrypted and stole approximately 250 gigabytes of sensitive data from the department’s servers. The Russia-based criminal entity post… Continue reading Ransomware Attacks on Municipalities Continue
How is backup different from archive? Backup is a restorable copy of current data that is meant to be used if the original data is damaged while archive is stored data that will never be overwritten.
The post Backup vs. Archive: Why They Are Not the Sa… Continue reading Backup vs. Archive: Why They Are Not the Same
SecurID G&L Cloud will offer our full-featured, high-performing solution and market-leading capabilities delivered from the cloud, ensuring that the world?s most security-sensitive organizations can work dynamically, accelerate innovation, and adva… Continue reading SecurID Governance and Lifecycle: Delivered from the Cloud
Humans are the biggest risk to an organization’s cybersecurity posture, and it might be a bigger risk than many realize. According to research from Elevate Security, human behavior had a direct role in 88% of total losses in the largest cybersecurity … Continue reading Your Security Awareness Training Isn’t Working