How Coronavirus is Raising New Business Continuity Phishing Challenges for InfoSec
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones? Cyber attackers are barraging businesses with phishing lures touting fake info about the Coronavirus. And although the lures may be fake, the security and...
Information Security: Your People, Your First Line of Defense
A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in improving your organization’s...
Two Simple Ways to Maximize Privilege and Work Product Protections in Data Breach Investigations
Data breach incident investigation materials are not automatically protected from discovery in civil litigation or government investigations. Whether such materials are protected from discovery can have serious cost and public relations implications for a company that...
Top 5 Cloud Security Myths Debunked
Five years ago, almost every organization on earth appeared to be just weeks away from moving all workloads into the cloud—or at least it seemed that way. But reality has moved at a far more measured pace. Instead of a ubiquitous, all-in phenomenon, most...







