Confidentiality

Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans
The recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that even the most capable cybersecurity tools and well-defined policies can be ...

Threats, Vulnerabilities, and Risks
As a business owner or employee in the UK, it's important to have a comprehensive understanding of the cyber threats, vulnerabilities, and risks that can impact your organisation. This blog post will ...
Ransomware and the C-I-A Triad
In earlier, more innocent (?) times, cyberattacks seemed to be fairly straightforward. You have the data exfiltration attacks, where copies of sensitive personal information and intellectual property are stolen, often without the ...
Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality
Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that ...

Encryption – CISSP Domain 3
We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning ...

Nearly Thirty Percent Of Most Popular VPNs Worldwide Owned By Hidden Chinese Organizations
Image via VPNPro Jan Youngren, writing at VPNPro has developed ownership intelligence (PDF) pointing to ninety-seven VPN properties that are owned by twenty-three organizations based in Communist China. H/T, further Via. Read ...

Making Sense of Security, Privacy and Confidentiality in Texting
Today, pretty much everyone is texting. It’s made life so much easier – send a message on your own time and preferred device, usually without having to stop what you’re doing, and ...
Data is the New Currency – Own Your Data or Someone Else Will
National Data Privacy Day reminds us how important it is to be empowered to take ownership to protect our privacy, control our digital footprints and advocate for the protection of privacy and ...

Controlling the Narrative: The Role of the Board of Directors
In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of ...
Secure Payments of the Future
Protecting the safety and integrity of the U.S. payment system is a top priority and the responsibility of all stakeholders in the payments industry. Learn more about how the Secure Payments Task ...