Reducing Manual Touchpoints to Minimize Risk

One of the single most effective ways to become more resilient as an organization today is to reduce the number of manual touchpoints behind the scenes and replace them with automated processes and workflows. The fact of the matter is, the more manual … Continue reading Reducing Manual Touchpoints to Minimize Risk

How to Ensure Continuous Compliance with NERC CIP

What is NERC? The North American Electric Reliability Corporation, or NERC, is the largest electric reliability organization in North America. They’re responsible for over 1,900 bulk power system operations spanning the United States and Canada and the… Continue reading How to Ensure Continuous Compliance with NERC CIP

How to Win at State Privacy Whack-A-Mole

New state privacy laws are popping up with increasing speed, and no two are alike. Each has unique compliance obligations, reporting requirements, and penalties. If you have clients, customers and/or supply chain partners in multiple states, manag… Continue reading How to Win at State Privacy Whack-A-Mole

Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Amazon’s Ring unit is moving ahead with plans to allow end-to-end encryption (E2EE).
The post Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch appeared first on Security Boulevard.
Continue reading Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Free Coventry University Course to Help Everyone Protect their Online Privacy

Now everyone can learn what privacy means, how your privacy is impacted when using the web and mobile apps, and how to protect your privacy online thanks to a free course from Coventry University.
The UK university has worked closely with experts inclu… Continue reading Free Coventry University Course to Help Everyone Protect their Online Privacy

Balancing Agility with Data Security

Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and … Continue reading Balancing Agility with Data Security

Cities Key in War on Ransomware, Neuberger Tells Mayors

When the cybersecurity industry talks about how critical public-private collaboration is to fending off and responding to threats, most of the “public” part of the conversation centers around the federal government, with individual states more recentl… Continue reading Cities Key in War on Ransomware, Neuberger Tells Mayors

Cybereason and Doosan Corp Partner to Secure APAC Enterprises

Cybereason is excited to announce a partnership with South Korean multinational conglomerate and Global Fortune 2000 leader the Doosan Corporation (Doosan Digital Innovation, or DDI) to protect enterprises from sophisticated cyberattacks on endpoi… Continue reading Cybereason and Doosan Corp Partner to Secure APAC Enterprises

Digital Habits During Pandemic Have Lasting Impact

The unexpected global pandemic left the world scrambling to maintain their daily activities and work as best they could. With stay-at-home orders that lasted for months on end—and some countries currently instituting another wave of lockdowns—most peo… Continue reading Digital Habits During Pandemic Have Lasting Impact

What the Van Buren Case Means For Security Researchers

The federal computer crime law prohibits “computer trespass.” This includes both “accessing” a computer without authorization, and “exceeding the scope of authorization” to access a computer. If these terms seem vague and ambiguous to you, well,… Continue reading What the Van Buren Case Means For Security Researchers