Our Blog

Stay updated with all the latest news and announcements

pic39

Can they work together?

Cybersecurity and Healthcare

In the wave of large-scale cybersecurity breaches sweeping the country, there is one sector which is barely reported on, and yet represents possibly the most pressing technological threat to human life.
                    
...

read more



pic38

The California Consumer Protection Act

A Brief Guide to CCPA

The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been ratified, many companies are still not sure if and how they will be affected.  

read more



pic37

3 Takeaways from the Ecuador Breach

Julian Assange Gets a Taste of His Own Medicine

Earlier this week, residents of Ecuador woke up to the news that much of their personal data, including banking details, employment information, and identification numbers, had been made publicly available by a small online consulting firm.
       

read more



pic36

What Facebook keeps getting wrong

The Culture of Cybersecurity

Yet another 419 million Facebook accounts have been breached. Add this to the 100s of millions already compromised in the Cambridge Analytica, UpGuard, and 'View As' scandals, and the question becomes: can Facebook ever be secure?            

read more



pic35

Continuous Monitoring

The Latest in Cybersecurity Trends

Here's a fact: On average, it takes companies nearly half a year to identify a cyber security breach. 
Here's another fact: Research shows that breaches that take over 30 days to contain cost an average of $1 million more than those contained within the first month.
...

read more



pic34

Lessons from Black Hat 2019 and Def Con 27

The Myth of Cyber Security

Riddle: What do Marriott, Equifax, and Capital One all have in common?
Answer: They've each been the victim of a data breach compromising 100 million+ users each; all in the past 12 months.                 

read more



pic33

What is DevSecOps and how can you benefit from it

DevOps is outdated. Here comes DevSecOps.

Over the last several years, DevOps has dramatically transformed the way in which software is designed, developed, and delivered.
                             
...

read more



pic32

5 Important Steps to Help Your Business Respond Quickly and Safely

You've Been Hacked. Now What?

Unfortunately, successful cyberattacks are growing far too common. A 2018 study found that nearly 70% of SMBs have experienced a cyberattack in the past year, yet an astounding 47% of respondents said they "have no understanding" of how to protect themselves ...

read more



pic25

What to look out for

Most Common Startup Cybersecurity Myths

In order to maximize investor funds within a short timeframe, it's not uncommon for startups to sacrifice security in the name of growth and agility.

read more



Load More