• A Guide To CA’s New Cybersecurity Laws

    California, has passed a number of internet and cybersecurity laws. This post from cybersecurity company SiteLock looks at the new net neutrality law, the privacy law, and the Internet of Things law, which was passed in August...

    • Posted 1 day ago
    • 0
  • Cybersecurity Risk With Seasonal Workers

    For many businesses, this is the season for rapid short-term hiring. There are risks that come with a hiring surge, and this post from RSA Security suggests some practices that will minimize that risk. Seasonal workers must...

    • Posted 2 days ago
    • 0
  • Litigation Holds And The GDPR

    The EU’s General Data Protection Regulation (GDPR) makes compliance with litigation holds more complicated. United States courts expect corporate litigants to properly preserve records and have issued severe sanctions in cases where they are not preserved. In...

    • Posted 1 week ago
    • 0
  • Security Best Practices That Stand the Test of Time

    The common wisdom says that hackers are eternally one step ahead of security. Nevertheless, a few best practices from way back when still work. Network security professional a few decades ago spent a lot of time monitoring...

    • Posted 1 week ago
    • 0
  • Who Is Reading Your Email Exchanges With Your Client?

    The vast majority of attorneys, more than 90 percent, routinely send confidential information over email, most frequently over Gmail. These are subject to all the hacks, leaks, and security breaches that non- attorneys experience, with the additional...

    • Posted 1 week ago
    • 0
  • Cybersecurity Primer From The Horse’s Mouth

    A global risk management company interviews its own chief information security officer for an inside take on the essentials of enterprise cybersecurity. Among the topics discussed are the ins-and-outs of hiring black-hat hackers, how the CISO’s understanding...

    • Posted 2 weeks ago
    • 0
  • Know Industry Compliance Standards Before Employing Container Security

    More companies are focusing on container security to ensure that they don’t ship software with known vulnerabilities, to protect sensitive data, and to maintain compliance with industry-specific regulations such as HIPAA, PCI, or SOC 2. In theory,...

    • Posted 2 weeks ago
    • 0
  • New Patent Heightens Privacy Concerns

    As of this month Amazon has a patent that arms Alexa with a voice analyzer capable of revealing characteristics such as emotional state, ethnicity and age, based on accent. Combined with already functional properties that determine location,...

    • Posted 2 weeks ago
    • 0
  • Employees’s Unintended Cyber-Breach Is An Underrated Threat

    The threat of the rogue employee or the vengeful former-employee is a frequent subject of cybersecurity alerts, and it’s a real issue. But companies are more likely to confront another kind of insider threat: the clueless or...

    • Posted 2 weeks ago
    • 0
  • SEC Turning The Screws On Cybersecurity

    In the face of a largely ineffectual “patchwork system of federal and state laws,” the SEC has emerged as a major de facto U.S. regulator of cybersecurity...

    • Posted 2 weeks ago
    • 0