
We are going to continue off of the previous blog and learn a little more about the GDPR. When you go out to the restaurant with a group of your…
We are going to continue off of the previous blog and learn a little more about the GDPR. When you go out to the restaurant with a group of your…
As cybercrime becomes more prevalent, international governing bodies and individual governments have set standards for cybersecurity in companies that handle their customers’ data. I’ve previously talked about the FTC and…
How does the Recovery function benefit the affected organization if they do it well? According to publicly available data, a company can lose 6.5% of its customer base in the…
What can we learn from Real-Life Examples? Retail giants Target and Home Depot are two notorious examples of large-scale cyber-attacks. In both cases, tens of millions of credit cards were…
What is NIST? Over the years, some executives that I’ve spoken with have thought that cyber risk management means buying and installing a bunch of software and hardware products, then…
What is ACP? To wrap things up in this series, I’m going to explain how ACP (attorney-client privilege) and AWP (attorney work product) apply to your company’s cybersecurity efforts. To…
What is NotPetya? Last time I talked about the backstory of NotPetya, a string of malicious code born from an NSA catalog of software exploits. In this post, I will…
In Light of Covid19 Before I start our newest series I wanted to write a quick note in regards to what is happening all around us. It probably feels like…
In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the illegal activity run sophisticated online companies. Today, let’s begin talking about how to defend your…
In recent weeks I’ve been talking about the millennial mobster and the reality that savvy international businesses make up the majority of cybercriminals. This blog post is the final week…