You and Your Devices at the United States Border

|
Traveling for business with your employer’s devices? Here's what you need to know regarding Customs and Border Patrol officers' searches of your electronic gadgets ... Read More

Consumer Security: What Are They Experiencing?

|
A new report by the Federal Trade Commission (FTC) reveals that the top three cybersecurity issues affecting consumers are identity theft, debt collection and imposter scams. What can our industry and government do to help protect our consumers? ... Read More

What Infosec Can Learn from Pro Sports

Absent a national draft for bringing new talent into infosec teams and without a transparent free agency, we have social networks like LinkedIn where talent quietly signals they are ready for a change and recruiters act in a sub rosa manner to get key talent into open positions. The opposite ... Read More

Food Security and Smart Packaging

Companies throughout the world are required to track the food we consume from farm to table. In this blog, we discuss the importance of protecting our food supply, both current and future, for the benefit and safety of each and every one of us ... Read More

Don’t Throw the Baby Out With the Bath Water

Lack of interest in managing the IT asset disposal process is putting companies both large and small at risk. We discuss how a company can ensure their retired devices are cleanly wiped or fully destroyed so that sensitive corporate data is not inadvertently exposed ... Read More

The Phisher Kings

It’s unanimous: the Phisher Kings are alive and well. Industry threat and intelligence reports reveal that time and again, you, your employees, your customers and your friends and family are all potential targets. We take a look at some of the latest reports, and discuss how to mitigate this threat ... Read More

Social Networks and Operational Security

Do your executives and employees post on social networks? Here’s the lowdown on how (and why) all companies should provide basic guidance on responsible social media usage to every employee ... Read More

When Hiring and Firing Puts Your IP at Risk

Employees aren’t permanent fixtures. They come and they go. When employees arrive or leave, you need to have in place capabilities to protect against intellectual property theft ... Read More

Security Awareness: Don’t Be an Ass and Assume

Security is not always convenient, yet convenience trumps security with great regularity. Employees want to make the right decisions, but it’s up to employers to help them do so ... Read More

Learning From Others and Ourselves

Not a week goes by when we don’t read of yet another healthcare provider losing, misusing or compromising patient data. In this fast-changing security landscape, learning from the experiences of others is key to safeguarding medical providers and their patients ... Read More