The Whole Wide World of Privacy Regulation

As you read this, a slew of nations and U.S. states are working on digital-privacy regulations that will have a huge impact on your business. What’s more, these regulators work independently of one another, which is to say that regulations implemented by one...

The Bucket’s Got a Hole in It: Vulnerabilities

In recent posts on this blog, I’ve talked about which bad guys are likely coming after your assets—that’s the who. We also discussed a few reasons why—an employee with a grudge, for example, or a jealous competitor, or a greedy stranger. Having assessed all that, the...

Defense in Depth: Is it Right For You?

Long before antivirus software was a twinkle in an engineer’s eye, humans were employing various strategies to protect their valuables from the prying hands of strangers. A lord and lady in a castle might have relied on tall, slippery castle walls for protection. If...

Talking—and Taking—Control

In Passwords 101, we looked at what is likely your first line of defense against cyberattack: the humble password. There are a lot of fairly simple things you can do to make sure you have the best password possible. However we also noted that passwords are just the...

Crossing the River of 2023

With the coming of the Chinese New Year beginning on January 22, we leave the fearsome Year of the Tiger and scurry into the Year of the Rabbit. In the Chinese zodiac, the Tiger is symbolic of fierce competition and unpredictability, while the Rabbit is associated...