Cybersecurity Executive ToolkitSecurity Risk AsessmentView All Resources How do companies mitigate data breaches? By mitigate, I assume you mean a company experienced a data breach and now wants…Kip BoyleAugust 20, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsView All Resources Federal Trade Commission Versus Fandango One of the first mobile apps from a third-party to launch on the iPhone was…Kip BoyleJuly 16, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsSecurity Risk AsessmentView All Resources Federal Trade Commission Versus ASUS In my last post, we discussed how the FTC used its powers in commerce to…Kip BoyleJuly 9, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Federal Trade Commission Versus Wyndham Worldwide In this series of blog posts, I'll be looking at the Federal Trade Commission (FTC)…Kip BoyleJuly 2, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityView All Resources Are Cyber Attacks More Dangerous than Nuclear Attacks? While cyber-attacks cannot kill tens or hundreds of millions of people in a single action,…Kip BoyleJune 25, 2019
Cybersecurity Executive ToolkitNetwork SecuritySecurity Risk AsessmentView All Resources What Worries Cybersecurity Professionals the Most? A top concern is, “do I have a false sense of security?” In other words:…Kip BoyleJune 18, 2019
Cybersecurity Executive ToolkitNetwork SecurityView All Resources Are Xfinity Hotspots Secure? Xfinity hotspots are a brand of public WiFi. And all public WiFi has this in…Kip BoyleJune 11, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources What are the key topics you would cover in your initial one-hour basic training program on security for non-IT personnel? Q: What are the key topics you would cover in your initial one-hour basic training…Kip BoyleMay 28, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources Can windows malware applications also infect other operating systems such as Linux and Mac? We're continuing in our series of blog posts that cover some of the most common…Kip BoyleMay 21, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyView All Resources How can we control cybercrime? We've just begun a series of blog posts that cover some of the most common…Kip BoyleMay 14, 2019