The Seven Security Sessions Not to Miss at VMworld 2018

The Seven Security Sessions Not to Miss at VMworld 2018

| | aria sds, DEVOPS, nsx, nvoy, security, VMworld
Are you attending VMWorld 2018? If you’re attending VMWorld 2018, and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need. To help, we’ve compiled the top seven presentations for ... Read More
contact us to learn about cyber insurance coverage

Everything You Need to Know About Cyber Insurance Policy Coverage

As the liability associated with data breaches is rolling “downhill” to smaller companies and vendors that provide other business services, the need for cyber insurance is becoming more important. However, paying attention to the details is crucial to understanding what kind of insurance an organization requires and under what circumstances ... Read More
contact us to learn how cspi can help you with cyber enforcement

The FTC: The Law and Order of Cyber Attacks

Understanding the FTC’s Role in the investigation and enforcement of cyber attacks In a previous blog, we discussed the FTC and its role in enforcing various data privacy policies. In this article, we’ll take a closer look at how it developed into the main cyber enforcement body, how it assesses ... Read More

The Instrumental Role that FTC Plays in Data Privacy Policy and Enforcement

| | Data Privacy, FTC, GDPR, security
There are always interesting and insightful presentations at the RSA security conference, and this year was no exception. However, there was one session that really captured our attention: “Cybersecurity and Data Breaches from a Business Lawyer’s Perspective.” This was presented by Kathy Winger, a practicing business attorney who provides guidance ... Read More
DevSecOps vs. SecDevOps vs. DevOpsSec: Is there really a difference in these secure DevOps terms?

DevSecOps vs. SecDevOps vs. DevOpsSec: Is there really a difference in these secure DevOps terms?

| | security
In previous articles we’ve talked about the need and challenges associated with securing DevOps environments. It’s a complex topic. At the root of the matter is the fact that it has to do with the overlap of the three main functions in any organization: Application developers (Dev) who must quickly ... Read More

How CSPi helped Broward College get out of the IT business

| | IT Solutions
Making a bold move away from traditional IT enables Broward College to embrace its Cloud First vision and the business of helping students succeed. What do you do when a client comes to you with big aspirations and an ambitious vision but is constrained by the realities of its sector? ... Read More
The Emperor’s New Clothes: Threat Hunting for Breach Prevention is Not Working

The Emperor’s New Clothes: Threat Hunting for Breach Prevention is Not Working

| | security
In the story of the Emperor’s New Clothes, the emperor parades before his subjects in his new “clothes,” yet no one dares to say that they do not see any suit of clothes on him for fear that they will seem “unwise.” There’s a parallel in the security world today ... Read More
what is the 23 nycrr 500 regulation?

What is the 23 NYCRR 500 Regulation?

| | security
In prior blogs, we discussed the rise of data privacy regulations across all industries and how it has been challenging for organizations to stay on top of the varying and conflicting requirements. In this blog, we take a look at New York’s law – 23 NYCRR 500 – that has ... Read More
™

Sorry for the Inconvenience

| | security
The Breaches Just Keep Coming (and So Do the Ramifications) Recent high-profile data breaches prove that the problem is getting worse, not better. If traditional security tools and approaches aren’t working, what can companies do to protect themselves from the next data security breach? The Breaches Just Keep Coming (and ... Read More
Not All Incidents Are Created Equal

Not All Incidents Are Created Equal

| | security
Not All Intrusion Alerts and IT Incidents are Created Equal With all the intrusion alerts received in a day, it is important for companies to define from their perspective – What exactly is a security incident? And more important, what can organizations do to improve their incident response approach? This ... Read More