Select Page
Little Red Riding Hood and Bad Data

Little Red Riding Hood and Bad Data

Everything in security boils down to data. Often, you are protecting private, sensitive or valuable data. You use data about data (Metadata). You monitor data about how people use your data (Security Events). You gather data on data in order to focus your attention...
Cyber Insurers Enter the Ratings Game

Cyber Insurers Enter the Ratings Game

The recent surge in ransomware attacks on U.S. cities and companies has data security and privacy professionals as well as third party information security leaders scrambling for better defenses and responses. This need is focusing more attention on cybersecurity...
Where Does Your Data Sleep?

Where Does Your Data Sleep?

On Thursday morning, February 20, 2020, people in tune with cybersecurity news woke to read that the private information of almost 11 million guests that stayed at the MGM Grand hotel and casino was posted publicly on a hacking forum.  Justin Bieber, Twitter CEO Jack...

This site uses cookies

Please note that on our website we use cookies necessary for the functioning of our website, cookies that optimize the performance. To learn more about our cookies, how we use them and their benefits, please read our Cookie Policy and Privacy Policy.

Acceptance