There is no denying that privacy and data protection continue to go mainstream. International and domestic privacy laws are continuing to pop up, and a global pandemic has meant that countries and..
When faced with economic disruption, organizations may look to business functions that are usually considered cost centers, including cybersecurity, as an opportunity for cost reduction. Whether..
The COVID-19 pandemic has required business leaders across every industry to rapidly shift their attention to countless new and pressing priorities: ensuring employees and family members are safe..
The impacts of COVID-19 are just beginning to surface, posing new challenges to industries and businesses to stay operational and forcing them to rapidly adjust to a remote workforce. The..
On the campus of Columbia University, privacy attorneys, technologists and other enthusiasts gathered for the PrivSec Conference New York 2019 as part of the Data Protection World Forum event..
Every year, Las Vegas hosts what is colloquially referred to as “Hacker Summer Camp;” Black Hat and DEF CON are considered the premier security events for cybersecurity practitioners and the..
Pay your taxes. Walk the dog. Submit that expense report. Each of us has that ever-growing catalogue of tasks to accomplish and slowly cross items off the list. Whether we are holding ourselves..
Throughout 2018, senior leadership – and even the boards – of major financial institutions in New York will be discussing cybersecurity. This is something most security professionals have been..
Research has found that Chief Information Security Officers (CISO) spend over 75% of their time simply trying to protect their assets rather than acting strategically to manage risk in the..
As antivirus vendors and cybersecurity professionals make headway against global malware and cyberattacks, hackers have evolved and become more advanced in order to profit from their exploits.
Most organizations have a Business Continuity Plan (BCP) in place to address planned procedures in the wake of man-made or natural disasters. But having a documented plan is only a piece of the..
The appeal of cloud computing is undeniable. The cloud has eliminated traditional IT barriers to market entry, inspired innovative business models, and improved business efficiency.
As organizations attempt to stay ahead of cyber threats, Social Engineering tops the list of the most popular hacking methods. Social Engineering is the use of human interaction to obtain..