A Communications Framework for Insider Risk Management

The Insider Risk Management (IRM) world is filled with buzzwords. Phrases like “insider threat”, “the human element”, “zero trust” and “data exfiltration” have come to prominence as our community of IRM professionals ...
Google Yahoo spam

Top 6 Email Security Technologies for the Enterprise

Email security refers to the measures taken to protect email communications from unauthorized access, use, disclosure, disruption, modification or destruction. It is important because email is a commonly used method of communication ...
Security Boulevard
Veeam data Rezilion Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Ask Chloé: Response Time Etiquette

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé offers advice to an InfoSec ...
Security Boulevard
CISO Stories Podcast: Communications Before, During and After a Breach

CISO Stories Podcast: Communications Before, During and After a Breach

Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the ...
Salesforce phishing

Is Facebook a “Party” to Capture of Offline Activity?

Facebook uses tracking plug-ins; bits of code that the consumer is unaware of, to track the behavior of users when they log out of the social media site, and which tells Facebook ...
Security Boulevard
Patient Engagement

HIPAA, Telehealth and COVID-19

The Department of Health and Human Services Office for Civil Rights (OCR) recently relaxed HIPAA enforcement: they won’t penalize providers who use tools for telehealth that are not HIPAA compliant. It makes ...

Are We Giving Up Our Privacy?

Every so often a tool takes off that suddenly everyone is using to communicate—one day it’s Google Hangouts, the next it’s Slack. Right now, that tool is Zoom, even though Skype and ...

5 Tips for Remote Work

In an effort to contain the Coronavirus, businesses are increasingly ordering employees to work from home. For many workers this transition can be challenging – only a third of employees in the ...

Controlling the Narrative

We live in an age where businesses are constantly on the alert for information leaks: consider the landmark Sony Hack to the recent Tesla emails. The challenge for businesses is staying in ...