Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
role: CSCO
Executive Security – In Data Privacy Chess, King and Pawn are Equal
CEOs, other top executives and their families are increasingly the target of violent physical attacks as ideological extremism is on the rise. They’re also a prime target for cyber attacks… Continue reading Executive Security – In Data Privacy Chess, King and Pawn are Equal
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
Supply Chain Attacks are On the Rise – A Primer on Supply Chain Privacy Risk
Supply chain privacy risk presents a new attack surface for organizations with complex supply chains. Cyber criminals, hackers and other threat actors play an ongoing game of cat and mouse… Continue reading Supply Chain Attacks are On the Rise – A Primer on Supply Chain Privacy Risk