Connect with your InfoSec department.
With any project involving IT assets, there is a process to have the plan/process approved. This procedure is in place to keep the...
Atlanta: Issues, Part II
The city of Atlanta operations had been severely crippled in March 2018, arising from a rather serious and in-depth ransomware attack....
California’s Version of GDPR: Applicable to Consumer Embedded Systems?
California recently passed an aggressive data privacy law. The California legislature passed AB375 (The California Consumer Privacy Act...
Please investigate third party vendors with any computer or network access
Over the last five years there have been many, many corporate data breaches. These have been published and republished numerous times....
Technology Advancement Tempered with Prudence
Technology is advancing at such a fantastic rate. The pace at time is difficult to manage. These advances have the distinct possibility...
Another tool for monitoring insider risk
The risk to an organization is manifested in many different packages and from many sources. One particularly poignant area of potential...