As U.S. states implement new second-generation privacy laws (there are currently 8 states – can you name all of them?), the rules regarding data retention are changing and you might want to be prepared – unless, of course, you enjoy spending tens of thousands of dollars on lawyers to defend yourself, hours being deposed and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cybersecurity and privacy are a key pillar of every company’s risk governance program – or at least should be. Alicja Cade, Director, Financial Services, Office of the CISO, Google Cloud suggests some questions Boards and CEOs should be asking about the company’s cybersecurity program. Here are some questions that she is recommending the Board gets […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is a secondary problem of vendor cyber risk. The first problem is that you are dependent on a lot of vendors. You have to depend on those vendors. If they screw up, you get sued. And you lose customers. To make matters worse, when one of your vendors gets breached, you are only one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The stakes in getting breached are definitely increasing. Historically, victims of a breach have sued the breached company claiming some potential future, but vague, damages. Often the suits get thrown out saying that these potential future damages are not sufficiently real. Independent Living Systems is a VENDOR to healthcare providers in Florida. They were breached […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. government released its widely anticipated National Cybersecurity Strategy on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive ‘hack-back’ approach to dealing with foreign adversaries and ransomware actors. The strategy is just that, a roadmap. While parts of it can be done without Congress’ approval, lots of it require additional authority. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Many companies allow employees to use their own personal computers for work. They do this for employee convenience and an apparent cost savings. After all, if we don’t have to buy employees their own laptop, certainly we will save money. At least it seems like that is true. In a perfect world, with no hackers, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]