CyberNext Summit KuppingerCole Gallery
Cybersecurity is shifting toward more distributed and dynamic models. (more…)
Cybersecurity is shifting toward more distributed and dynamic models. (more…)
This September, a panel of Data Security and Privacy Liability – Working Group 11 (WG11) members led a dialogue with WG11 members at the 2019 midyear meeting: Proactive privacy and security governance: Complying with global data privacy and security regulations (more…)
Your Vendors May Be Weak Links in Supply Chain Breaches
(more…)The Cyber Security Summit began with a speaker from the Department of Justice, and it ended with a speaker from the FBI – presenting on risks and reasonable protocol. (more…)
CLOUD ENVIRONMENT: The Capital One incident is one of the largest data breaches of all time, involving 100 million credit card applications and 140,000 Social Security numbers; the bank’s stock market price took an immediate hit as company executives and IT personnel began scrambling to implement the firm’s incident response plan. (more…)
Every organization today needs a multi-layer security strategy to protect its enterprise from the multitude of cyber security threats that exist today; While one cannot underestimate the importance of an email security gateway, web filtering solution, or endpoint protection system, there is no question as to the prominence of an enterprise firewall. (more…)
If you are a business in the United States, or anywhere for that matter, its time to start taking notice at where your consumers are located; Because compliance regulations such as those implemented by the European Union, California and Colorado may apply to your organization if you hold the personal information and data of people located in those jurisdictions. (more…)
HALOCK Security Labs led the Cyber Security forum for the South Carolina Primary Health Care Association (SCPHCA). Managing consultants, Tod Ferran, CISSP, QSA, ISO 27001 Lead Auditor, and Glenn A. Stout, Ph.D., CISSP, CISM, GSEC, PMP presented on hot topics. (more…)
As we have outlined in prior articles, states such as California, Colorado, and New York are actively implementing regulations that will enforce compliance regulations concerning the management of personal information with reasonable security. Like cybersecurity itself, legislation is a dynamic process and states continue to tweak and add amendments to the existing laws. (more…)