Why Freelancers Should Prioritise Cybersecurity

Article by Beau Peters
As a freelancer in any industry, you are likely more susceptible to hackers and cybercrime than many other professions. Not only are you pulling in a constant stream of customer data, but as a worker on the go, you likely work … Continue reading Why Freelancers Should Prioritise Cybersecurity

5 Steps to Effective CUI Classification

Prior to the U.S. government’s National Archives and Records Administration’s (NARA) implementation of the Controlled Unclassified Information (CUI) protection framework, government agencies employed ad hoc agency-specific policies, procedures and mar… Continue reading 5 Steps to Effective CUI Classification

5 Steps to Effective CUI Classification

Prior to the U.S. government’s National Archives and Records Administration’s (NARA) implementation of the Controlled Unclassified Information (CUI) protection framework, government agencies employed ad hoc agency-specific policies, procedures and mar… Continue reading 5 Steps to Effective CUI Classification

Can the Government Compel You To Produce Records That Don’t Exist Yet?

We all know that the government can get a subpoena compelling you to produce records that are in your “possession, custody or control,” provided those records are not privileged, along with a few other constraints. They can also get a search warrant a… Continue reading Can the Government Compel You To Produce Records That Don’t Exist Yet?

How to Mitigate Risk Against Operational Technology (OT)

Operational technology, or OT, is hardware and software technologies that monitor and control a variety of physical operations including, but not limited to processes, devices, and even various infrastructures like public rail transportation. As OT bec… Continue reading How to Mitigate Risk Against Operational Technology (OT)

Breach Clarity Weekly Data Breach Report: Week of June 7

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of June 7

Designing and Building a Security Architecture

The challenge of maintaining security across different offices, projects and systems can be daunting. Many businesses develop a patchwork of tools and procedures, often applied retroactively, that’s difficult to keep updated and typically involves a l… Continue reading Designing and Building a Security Architecture

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

We want to trust our employees and contractors working within our organizations. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business … Continue reading CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

Genius! Apple Bribes Woman over Naked Pic Theft

Apple is under fire for its hypocrisy in the case of techs who stole naked pictures and video from a woman’s iPhone.
The post Genius! Apple Bribes Woman over Naked Pic Theft appeared first on Security Boulevard.
Continue reading Genius! Apple Bribes Woman over Naked Pic Theft

Social Media Regulation: The Line Between Privacy and Protection

The debate over how much responsibility social media companies should have when it comes to regulating or policing what users post continues, particularly in the past year or so. Big tech has faced no shortage of criticism over its failure to curb the… Continue reading Social Media Regulation: The Line Between Privacy and Protection