digital eye peeking through binary code

“Privacy” Doesn’t Equal “Security”

Posted by - November 21, 2018
The Importance of Knowing the Difference With the weekly reports of cyber events and data breaches, cybersecurity is a trending topic. While the concern is warranted, there is some confusion between information privacy and information security. Just because information is private does not necessarily mean it is secure. Executives, compliance…
Read More
white padlock on blue binary code

Preparing for Stronger Data Privacy Law Based on GDPR and CCPA

Posted by - November 20, 2018
3 Steps to Bolster Privacy The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) may signal a coming global standard for data protection. Why? Business. The pressure is ever increasing to protect data, meaning we are likely to see an uptick in individual state data protection…
Read More
close up of remote with smart TV in background

5 Hidden Privacy Dangers

Posted by - November 8, 2018
Lesser-Known Risks for Corporations and Consumers Big data corporations are always seeking new ways to capture data from consumers, and some of those tactics they employ can expose their targets – and at times, their employers – to significant privacy risk. Greg Sparrow discusses some of the most unknown privacy…
Read More
curved bridge disappearing into heavy fog

Ensuring GDPR Compliance Across the Supply Chain

Posted by - November 5, 2018
Moving Forward Through Ambiguity Companies trying to find their way to compliance with the General Data Protection Regulation are struggling to ensure that their supply chains are compliant as well. The GDPR readiness of suppliers typically remains a black box, but it’s not due to willful resistance. Matan Or-El, co-Founder…
Read More
map of EU with padlock on top

Risky Business in a GDPR World

Posted by - November 2, 2018
Navigating Privacy and Compliance As the recent data breach by Facebook has made clear, meeting strict GDPR guidelines is difficult. Cory Cowgill, CTO at Fusion Risk Management, discusses GDPR requirements and their impact on data retention and security. If you are part of nearly any enterprise organization, then May 25,…
Read More
illustration of criminal "fishing" between laptops

When Emails Attack

Posted by - November 1, 2018
5 Tactics to Prevent Phishing Exposure Cyber criminals have used phishing emails to launch the vast majority of cyberattacks. Amid a wave of new data management regulations, the major data breaches of late reveal a critical risk vector that cyber criminals are exploiting: the human. Major data breaches, such as…
Read More
IT security team

Developing Corporate Security Policies to Avoid Data Breaches

Posted by - October 30, 2018
Minimizing D&O Cyber Liability In the second of a series of articles discussing emerging theories of liability for directors and officers, Stephanie Resnick, Philadelphia Office Managing Partner and Chair of the Directors’ and Officers’ Liability Practice Group at Fox Rothschild, and John Fuller, an associate and member of the Directors’…
Read More
SIEM in red on binary code background

A New SIEM for a New World

Posted by - October 23, 2018
Moving from “Big Rules” to “No Rules” No two cybersecurity events are exactly alike, so it’s a fool’s errand to plan and protect solely against known threats. The need is greater now than ever for security teams to arm themselves with innovative SIEM technology with automatic threat detection and adaptive…
Read More
thousands of points of data mapped out

3 Ways to Leverage Predictive Analytics

Posted by - October 18, 2018
Using Analytics to Gain a Competitive Edge Predictive analytics is quickly changing the way businesses effectively allocate their budgets and gain their edge over competitors. However, even companies with highly sophisticated predictive analytics programs still often run into challenges. Here are some ways to leverage your predictive analytics model by…
Read More
concept of archive, laptop with a row of files

The Changing Role of Electronic Information Archiving

Posted by - October 12, 2018
From Mandatory Requirement to Valuable Business Enabler Just because you have prohibited employees from communicating about business matters via any channel apart from email doesn’t mean your bases are covered. Mike Pagani explains how prohibition is not prevention, and why, for organizations in highly regulated fields, more concrete steps must…
Read More
gears superimposed over city skyline

Mitigating Data Risk in M&A Transactions

Posted by - October 8, 2018
What to Do When a Deal Falls Apart What happens after a planned deal falls apart? In the process of seeking approval, a wealth of sensitive company information is transferred between entities – from financials to intellectual property. This article explores how a company can properly recover following the dissolution…
Read More
clouds beside laptop on wooden table

4 Steps to Secure Your Data in the Cloud

Posted by - September 28, 2018
Managing Risk in a Shifting Regulatory Environment Given the frequency of significant data breaches, organizations must be increasingly vigilant about data protection. Vibhav Agarwal, Director of Product Marketing at MetricStream, offers this primer on how enterprises can better secure their data in the cloud. In today’s information age, a daunting…
Read More