GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content

Facebook was lucky when the Information Commissioner’s Office (ICO)—the UK’s independent authority set up to uphold information rights in the public interest—hit the U.S. social media company with a £500,000 fine. Related: … Continue reading GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content

GUEST ESSAY: Why corporate culture plays such a pivotal role in deterring data breaches

Picture two castles. The first is impeccably built – state of the art, with impenetrable walls, a deep moat, and so many defenses that attacking it is akin to suicide. The second one isn’t quite as well-made. The walls are reasonably strong… Continue reading GUEST ESSAY: Why corporate culture plays such a pivotal role in deterring data breaches

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at S… Continue reading GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The United States Intelligence Community, or IC, is a federation of 16 separate U.S. intelligence agencies, plus a 17th administrative office. The IC gathers, stores and processes large amounts of data, from a variety of sources,  in order to prov… Continue reading GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

GUEST ESSAY: Atrium Health data breach highlights lingering third-party exposures

The healthcare industry has poured vast resources into cybersecurity since 2015, when a surge of major breaches began.  While the nature of these breaches has evolved over the last four years, the growth in total healthcare incidents has unfortuna… Continue reading GUEST ESSAY: Atrium Health data breach highlights lingering third-party exposures

GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

The vast majority of cyber attacks against organizations pivot off the weakest security link: employees.  The good news is that companies today have ready access to a wide variety of tools that can simulate common types of attacks and boost employ… Continue reading GUEST ESSAY: 5 anti-phishing training tools that can reduce employees’ susceptibility to scams

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

Privacy regulations and legislation are topics that continue to be of concern for consumers and businesses alike.  News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small … Continue reading GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. A  string of advances in biometric authentication systems has brought facial recognition systems, in particul… Continue reading GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

GUEST ESSAY: Did you know these 5 types of digital services are getting rich off your private data?

Now more than ever before, “big data” is a term that is widely used by businesses and consumers alike.  Consumers have begun to better understand how their data is being used, but many fail to realize the hidden privacy pitfalls in eve… Continue reading GUEST ESSAY: Did you know these 5 types of digital services are getting rich off your private data?

GUEST ESSAY: A guide to implementing best security practices — before the inevitable breach

The United States has experienced the most cybersecurity breaches in the world and the Equifax Breach was one of the first to be considered a “mega breach.” The headlines immediately attempted to lay the blame, in large part, on the fact th… Continue reading GUEST ESSAY: A guide to implementing best security practices — before the inevitable breach