Article

The Cybersecurity Executive Order: What You Need To Know and Why

On May 11, 2017, the Presidential Executive Order 13636 on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (“Cybersecurity Executive Order”) was released. ...
June 29, 2017
Article

Hidden Cost of Cyberattacks: What Automation Can Do to Save You Money

In 2016, Deloitte published its white paper on the hidden cost of cyberattacks. The firm reported that of the fourteen “impact factors,” some are obvious while others are less so. Cybera ...
June 27, 2017
Article

How Today’s Credit Card Controls Evolved from a Lost Wallet

Credit cards have come a long way since the night in 1949 when Frank McNamara, out for dinner with his clients, realized he had forgotten his wallet and wished for some sort of account to wh ...
June 22, 2017
Article

Vetting Vendors: You Are Not the Weakest Link

Vetting vendors can almost feel like a game show that has stakes higher than any prize. Anyone who remembers the old television show The Weakest Link can vividly recall how one by one, each ...
June 22, 2017
Article

GDPR Compliance: An Introduction to the Legislation (Part 2 of 2)

The EU General Data Protection Regulation (GDPR) enforcement date, May 25, 2018, is now less than a year away. With this in mind, companies are scrambling to decode 260 pages of regulation t ...
June 15, 2017
Article

GDPR Definition: An Introduction to the Legislation (Part 1)

The EU General Data Protection Regulation (GDPR) incorporates a lot of new definitions. The enforcement date of May 25, 2018 is now less than a year away. With this in mind, companies are sc ...
June 13, 2017
Article

Wednesday’s Women in Infosec: Eleanor Dallaway

This month's Wednesday's Women in Infosec profile, Eleanor Dallaway, is another one of the 119 Twitter accounts you need to be following. Ms. Dallaway has a long career in the infosec space. ...
June 7, 2017
Article

Legal Liability in Information Security: How Compliance Can Be Used to Protect Assets

Although the word Wannacry may feel overused by now, one of the most important things going forward is going to be reviewing legal liability in information security arising out of a ransomwa ...
June 2, 2017