Identity Theft

Identity Theft Awareness: Who Are You?

by Sabine Zimmer | January 30, 2023 | Data & Cybersecurity, Data Protection, Privacy

Have you discovered who you truly are? Did you take the Myers-Briggs? Do you know your sign? Abilities, attributes, and astrology be darned - to an identity thief, you just represent a unique set of numbers and the opportunity to abscond with your Personally Identifiable Information (PII). Thank ....

data

My Data Lies Over the Ocean, My Data Lies Over the Sea

by Sabine Zimmer | October 31, 2022 | Data & Cybersecurity

Data zips across the Atlantic over submarine communications cables and pings across the sea to and from satellites at light speed. These transatlantic data flows are critical to the economic relationship between the United States and the European Union: The White House places a $7.1 trillion value ....

Penetration Testing1

Penetration Testing in Risk Management

by Marisa Sgambati | August 3, 2022 | Data & Cybersecurity

You wouldn’t leave your home without making sure the door was shut and locked behind you. You wouldn’t install an alarm system that doesn’t sound when a burglar enters. So, why would you not take the same precautions for your company? Consistently testing the effectiveness of application secur ....

Gramm Leach Bliley Act GLBA

Spotlight on the Gramm-Leach-Bliley Act (GLBA)

by Linnea Solem | July 5, 2022 | Data Protection, Public Policy

Last week Bob Maley, Chief Security Officer at Black Kite and I led a Fireside Chat discussion on the current regulatory landscape regarding privacy and security. While state laws continue to advance and there is momentum for a Federal U.S. Privacy Regulation, the update by the Federal Trade Commiss ....

MicrosoftTeams image 1

Online Safety For Children

by Marisa Sgambati | June 8, 2022 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Protection

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving technological society. As a p ....

File Integrity Monitoring

FIM (File Integrity Monitoring): Protecting Customer’s Credit Card Data

by Ron Bradley | June 1, 2022 | Data & Cybersecurity

There’s FOMO (Fear of Missing Out) and then there’s FIM (File Integrity Monitoring). You do not want to miss out on understanding what FIM is all about and why the FBI (Federal Bureau Of Investigation) is concerned. The FBI Cyberdivision recently released a Flash Report reporting that cyber a ....

Next Page »