The Cost of BIPA Non Compliance is High The floodgate of lawsuits being brought in the State of Illinois over improper storage of biometric data has continued over the past several months, pretty much unabated. Illinois’ Biometric Information Privacy Act … Read More
Yearly Archives: 2017
Continuous Risk and Trust Assessment Approach
Continuous Risk and Trust Assessment Approach The industry standards in information security have been undergoing dramatic changes over the past several years. So what is the Continuous Risk and Trust Assessment Approach? The paradigm of network security monitoring has firmly … Read More
DFARS / NIST 800-171 Compliant
DFARS / NIST 800-171 Compliant Preventing the loss of sensitive information is one of the biggest challenges facing organizations in their day-to-day operations. Data loss prevention techniques are vital for establishing secure protocols. It is not surprising that the National … Read More
Edge Computing, IoT and Data Breaches
Edge Computing, IoT and Data Breaches In the era of high demand on data storage and organization, one of the most employed methods by firms to consolidate resources is edge computing. Edge computing is a method of optimizing cloud computing systems by … Read More
GTB Data Loss Protection Gives Users the Edge
GTB Data Loss Protection Gives Users the Edge The application of a robust data loss protection (DLP) program is vital for the secure function of organizations. The very real risk of a data leak is exponentialized by the sea of … Read More
The Encryption Burden of GDPR and the New York DFS
The Encryption Burden of GDPR and the New York DFS The persistently growing threat of cyber attack has begun to spur government agencies to enact security guidelines. These guidelines will have a mounting effecting on private industry. The most pertinent … Read More