Is a ransomware attack a data breach?
Ransomware is a loss of control Most IT people equate exfiltration of data from their network as the point at which control is lost and a data breach has occurred. They think of it like “where are the...
View ArticleA Guide to per State Data Breach Response
Part 1: Preparing for a US Data Breach In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation...
View Article[Podcast] Taking The Long View, Investing in Technology and Security
Leave a review for our podcast & we'll send you a pack of infosec cards. We’re living in exciting times. Today, if you have an idea as well as a small budget, you can most likely create it. This...
View ArticleUS State Data Breach Law Definitions
We discussed in Part 1: A Guide to Per State Data Breach Response the importance of understanding what classes of data you have in your control. We stress this point as it’s easy to get lost in the...
View Article[Podcast] Tracking Dots, Movement and People
Leave a review for our podcast & we'll send you a pack of infosec cards. Long before websites, apps and IoT devices, one primary way of learning and sharing information is with a printed...
View Article[Podcast] What Does the GDPR Mean for Countries Outside the EU?
Leave a review for our podcast & we'll send you a pack of infosec cards. The short answer is: if your organization store, process or share EU citizens’ personal data, the General Data Protection...
View ArticleData Security Software: Platforms Over Tools
As recent security incidents like NotPetya, Wannacry and the near daily data breach reports have shown, data security isn’t getting easier. And it’s not because IT groups aren’t putting in the work. IT...
View ArticleHow to Better Structure AWS S3 Security
If the new IT intern suggests that you install a publicly accessible web server on your core file server – you might suggest that they be fired. If they give up on that, but instead decide to dump the...
View Article[Podcast] Presenting Cybersecurity Ideas to the Board
Leave a review for our podcast & we'll send you a pack of infosec cards. There’s been a long held stigma amongst our infosec cohort and it’s getting in the way of doing business. What’s the...
View ArticleHow to use PowerShell for WannaCry / WannaCrypt cleanup and prevention
Explosive ransomware infection rates of WannaCrypt/WannaCry have IT groups trying to mass diagnose, update and protect their machines. Thing is, that’s just not practical to do manually – for pretty...
View ArticleIs a ransomware attack a data breach?
Ransomware is a loss of control Most IT people equate exfiltration of data from their network as the point at which control is lost and a data breach has occurred. They think of it like “where are the...
View ArticleA Guide to per State Data Breach Response
Part 1: Preparing for a US Data Breach In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation...
View Article[Podcast] Taking The Long View, Investing in Technology and Security
Leave a review for our podcast & we'll send you a pack of infosec cards. We’re living in exciting times. Today, if you have an idea as well as a small budget, you can most likely create it. This...
View ArticleData Breach Definition by State
In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation (GDPR) will eventually impact US based...
View Article[Podcast] Tracking Dots, Movement and People
Leave a review for our podcast & we'll send you a pack of infosec cards. Long before websites, apps and IoT devices, one primary way of learning and sharing information is with a printed...
View Article[Podcast] What Does the GDPR Mean for Countries Outside the EU?
Leave a review for our podcast & we'll send you a pack of infosec cards. The short answer is: if your organization store, process or share EU citizens’ personal data, the General Data Protection...
View ArticleData Security Software: Platforms Over Tools
As recent security incidents like NotPetya, Wannacry and the near daily data breach reports have shown, data security isn’t getting easier. And it’s not because IT groups aren’t putting in the work. IT...
View ArticleHow to Better Structure AWS S3 Security
If the new IT intern suggests that you install a publicly accessible web server on your core file server – you might suggest that they be fired. If they give up on that, but instead decide to dump the...
View ArticleKrack Attack: What You Need to Know
For the last decade, philosophers have been in agreement that there is another, deeper level within Maslow’s Hierarchy of Human Needs: WiFi Access. We’re now at the point where even the most mundane...
View Article[Podcast] Bring Back Dedicated and Local Security Teams
Leave a review for our podcast & we'll send you a pack of infosec cards. Last week, I came across a tweet that asked how a normal user is supposed to make an informed decision when a security...
View Article
More Pages to Explore .....