Podcast: California's New Consumer Privacy Act
Greg Mooney | | Security
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
Greg Mooney | | Security
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
In your efforts to secure critical business and personal data, don't forget your file transfer and data sharing systems. One often overlooked area that can leave you vulnerable to cyber attack are outdated or under-managed FTP servers.
Open source is cool. But when it comes to FTP client solutions, it may be hip to be square. Here's why proprietary software might be best for your company.
CIOs, CISOs, data protection officers and compliance managers who work for businesses that interact with citizens in the European Union (EU) now need to be on-guard. The countdown for the General Data Protection Regulation (GDPR), which went into effect May 25, is over.
Greg Mooney | | Security
So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...
Greg Mooney | | Security
Healthcare companies in the US have had to protect sensitive personal data for a long time to satisfy HIPAA compliance rules. But are healthcare companies on the hook in light of the GDPR?
Adam Bertram | | Security
In the previous articles, we focused on MOVEit Automation's REST API, but it’s now time to focus on MOVEit Transfer.
Jeff Edwards | | Security
The personal data of 380,000 customers of Hong Kong Broadband Network (HKBN), has been hacked, according to a statement from the company.
Adam Bertram | | Security
Logging into MOVEit's console or web interface works great for day-to-day management tasks or setting up one-time workflows but there are times when we need to automate with MOVEit Automation!
You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This...
Adam Bertram | | IT Insights | Security
Large organizations typically have lots of devices that require IP addresses. Client desktops, tablets, mobile and desk phones, servers and more all consume IPs. The only way to manage IPs at this level is to use Microsoft Dynamic Host Configuration Protocol (DHCP),...
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.
Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.
Jeff Edwards | | Security
Just last week, we were looking back at the most significant hacks and attacks of 2017, and wondering what lay ahead for 2018. Well, wonder no more.
Remember the corporate accounting scandals that took out Enron, Arthur Andersen and WorldCom? They all ended with prison sentences, layoffs, and billions of investor dollars lost forever.
Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...
This infographic is a great place to start getting acquainted with the 7 principles of data protection and what they mean for data in transit.
The cybersecurity skill gap is a growing problem in the IT industry. Simply, the skill shortage needs to be fixed in order to fight the growing cybersecurity threat landscape.
The blockchain is a disruptive technology, and its implications are not fully understood yet. Here is how the blockchain could change the audit world.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.