<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=254990494906321&amp;ev=PageView&amp;noscript=1">
x

Wednesday, April 15th, 10am PDT

Learn more about the types of threats facing retail organizations and how data discovery is essential for effective crisis response.

REGISTER NOW
SUBSCRIBE

Lifecycle of a Hack: The 5 Stages of a Data Breach

Alex Ciarniello March 10, 2020 Cyber Security, Information Security
If your organization discovers a data breach, it’s likely been weeks or months since the initial attack, according to a 2019 Verizon report. Read More

5 Current Cyber Attack Techniques and How to Stay Threat-Informed

Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially. Read More

How Provider Compliance Protects Your Organization (and the Public)

Alex Ciarniello January 09, 2020 Privacy, Information Security
On January 1, 2020, the California Consumer Privacy Act (CCPA) came into effect and it's kind of a big deal—it’s the first data privacy law of its kind in the US, and applies to any organization using California-based data, regardless of where they are located. Read More

Cyber Security Breach: What Happens in the Fallout?

Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light. Read More

How to Protect VIPs Against the Tragic Consequences of SIM Jacking

Alex Ciarniello December 03, 2019 Privacy, Information Security, Corporate Security
Imagine picking up your phone to send a text message or check Twitter, only to discover that all of your phone’s services are inoperable. Confused, you open your laptop to check your emails for overdue phone bills—but your email password doesn’t work, either. Read More

4 Questions "The Great Hack" Left Unanswered

Alex Ciarniello October 03, 2019 Privacy, Information Security
In March 2018, The Observer and The New York Times revealed one of the most controversial stories of the internet age: data from millions of Facebook users had been used, without their consent, to inform political campaigns. Read More

5 Ways To Protect Your Intellectual Property On Social Media

  Our thanks to Stephanie Meadows for letting us re-post her article on 5 ways to protect your intellectual property on Social Media. It was originally published on LinkedIn Read More
1