Online data privacy is an important security practice only just coming to the forefront of concerns facing organizations and individuals alike. Privacy Bee for Business is not alone in delivering… Continue reading How to Determine if a Data Privacy Solution is Likely to be Effective
role: CSCO
The Blurring Lines Between State Sponsored Threat Actors and Cyber Criminals
Like a bizarro-world DARPA (Defense Advanced Research Projects Agency), the military and defense organizations of foreign states hostile to the United States and allied Western nations have been driving innovation… Continue reading The Blurring Lines Between State Sponsored Threat Actors and Cyber Criminals
The Six Industries with the Highest External Data Privacy Risk
The title of this paper is kind of a misnomer. The fact is every industry is at significant risk of being targeted by hackers and threat actors. It may be… Continue reading The Six Industries with the Highest External Data Privacy Risk
Calculating the ROI into External Data Privacy Management Solutions
External data privacy management is a preventative activity focused on preempting data breaches and other damaging consequences of unsecured external data. For preventative solutions – those that don’t yield a… Continue reading Calculating the ROI into External Data Privacy Management Solutions
AI Powered Spear Phishing – Why Fighting Fire With Fire Fails
As if perpetrating cybercrimes – particularly spear phishing – weren’t easy enough for any aspiring hacker or established organized crime ring, it has just become even easier for bad actors… Continue reading AI Powered Spear Phishing – Why Fighting Fire With Fire Fails
Solar Winds Attack – A Postmortem Through The Prism Of External Data Privacy Management
This postmortem document examines one of the most significant cybersecurity breaches of the 21st century – the SolarWinds Cyberattack – and deconstructs the vulnerabilities and failures enabling its success. Part… Continue reading Solar Winds Attack – A Postmortem Through The Prism Of External Data Privacy Management
How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Scammers, particularly cyber thieves, make their living by finding the easiest ways to separate marks from their money. That is, this type of criminal doesn’t want to work too hard. … Continue reading How any Organization Looks in the Eyes of a Hacker – How to Avoid Being Seen as a Target
Executive Security – In Data Privacy Chess, King and Pawn are Equal
CEOs, other top executives and their families are increasingly the target of violent physical attacks as ideological extremism is on the rise. They’re also a prime target for cyber attacks… Continue reading Executive Security – In Data Privacy Chess, King and Pawn are Equal
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy