A Skeleton Key – Beyond Politics! – to Clinton Email & Information Governance...
Secretary Clinton will likely do unintentionally for the duty to preserve electronic records in controversy what Edward Snowden did intentionally […]
View ArticleConnected Cars as Privacy Platforms & Security Networks
NO SURPRISES! intoned the digital advertising guru at the IAPP Global Privacy Summit, preaching the conventional wisdom of the business […]
View ArticleIS the OPM Breach the Cyber Pearl Harbor?
When the disastrous data breach goes down, it bypasses the digital dossiers of the data brokers. It turns out not to […]
View ArticleThe Privacy Platform Wars are ON!
The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced […]
View ArticleRetailers, Hospitality: Ready for the payments liability shift on 10/1?
If you take payment cards and don’t use chip technology by October 1st, the card brands will have you both […]
View ArticleSigns of Cyber-Seriousness
Recent days have produced real and unprecedented signs of concerted efforts to begin to solve global cybersecurity problems. Most […]
View ArticleHow LabMD Could Refocus the FTC on Real World Security
In fighting terrorism or fighting identity theft, the smart triple focus is on prevention of harm through good protection, detection […]
View ArticleTop 10 Ways to Protect Your Company’s Data
You know how important data is to your business and you have been hearing about data breaches for more than … Continue reading Top 10 Ways to Protect Your Company’s Data → The post Top 10 Ways to...
View ArticleRansomware Cuts Deep, in Life & in Coverage
By Jon Neiditz and David L. Cox 1. Beyond Breaches With ransomware, cybersecurity in healthcare has gone far beyond HIPAA … Continue reading Ransomware Cuts Deep, in Life & in Coverage → The post...
View ArticleBeyond Breach: Challenges in Cybersecurity & Coverage
By Jon Neiditz and David L. Cox Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, … Continue reading Beyond Breach: Challenges in Cybersecurity &...
View ArticleCybersecurity to Protect Knowledge Assets — Study with Ponemon
New Study Reveals that Companies Are Unprepared to Protect What Matters Most to Them How are you protecting your crown … Continue reading Cybersecurity to Protect Knowledge Assets — Study with Ponemon...
View ArticleCyber Winter is Here, and Coming to Regulation: New York’s Cybersecurity Rule...
Authors: Jon Neiditz and Julie Grundman The State of New York’s response to two large cybersecurity breaches may fuel the transformation … Continue reading Cyber Winter is Here, and Coming to...
View ArticleCOMPANIES ARE BEGINNING TO PROTECT THEIR KEY ASSETS WITH CYBERSECURITY
It has been such an incredible pleasure and privilege to work with Larry Ponemon and the Ponemon Institute to track … Continue reading COMPANIES ARE BEGINNING TO PROTECT THEIR KEY ASSETS WITH...
View ArticleThe Privacy Platform Wars are ON!
The privacy platform battles we promised clarified and escalated last week as we learned how services may learn from advanced … Continue reading The Privacy Platform Wars are ON! → The post The Privacy...
View ArticleRetailers, Hospitality: Ready for the payments liability shift on 10/1?
If you take payment cards and don’t use chip technology by October 1st, the card brands will have you both … Continue reading Retailers, Hospitality: Ready for the payments liability shift on 10/1? →...
View ArticleSigns of Cyber-Seriousness
Recent days have produced real and unprecedented signs of concerted efforts to begin to solve global cybersecurity problems. Most … Continue reading Signs of Cyber-Seriousness → The post Signs of...
View ArticleHow LabMD Could Refocus the FTC on Real World Security
In fighting terrorism or fighting identity theft, the smart triple focus is on prevention of harm through good protection, detection … Continue reading How LabMD Could Refocus the FTC on Real World...
View ArticleTop 10 Ways to Protect Your Company’s Data
You know how important data is to your business and you have been hearing about data breaches for more than … Continue reading Top 10 Ways to Protect Your Company’s Data → The post Top 10 Ways to...
View ArticleRansomware Cuts Deep, in Life & in Coverage
By Jon Neiditz and David L. Cox 1. Beyond Breaches With ransomware, cybersecurity in healthcare has gone far beyond HIPAA … Continue reading Ransomware Cuts Deep, in Life & in Coverage → The post...
View ArticleBeyond Breach: Challenges in Cybersecurity & Coverage
By Jon Neiditz and David L. Cox Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, … Continue reading Beyond Breach: Challenges in Cybersecurity &...
View Article
More Pages to Explore .....