technology
Keeping HR Data Secure in a Time of Data Breaches
Risk management has never been more important, especially at a time when data breaches continue to increase. There are numerous high-profile examples involving the theft of employee data. Identity fraud cases exceed ...
How the Tech Landscape Could Change Post-Election
With election season in full swing, we thought it might be fun to ask ourselves a hypothetical question: How might the technology landscape as we know it change if the current administration ...
Why and How are Enterprise Companies, Like eBay, Actively Port-scanning End-users’ Computers From Their Websites
You might have recently heard that eBay is performing port scanning, while online shoppers are visiting their website. At first glance, it will probably sound a bit strange, as port scanning is ...
Taking Third-Party Application Security to the Next Level: Version 2.8’s Multiple Website Dashboard
Version 2.8 Goes LIVE! Almost any organization today uses dozens of websites and subdomains. Each provides essential functions and uses dozens of third-party apps and tags to produce its capabilities. Those assets ...
The Cybersecurity Effects of Fourth-Parties on Websites
Fourth party apps on websites are commonly referred to as “the vendor’s vendor code”. Fourth-party apps may offer additional benefits, but at the same time they also carry a set of threats ...
Zero Trust: Identity at the Core
In my last post we looked into why Zero Trust is not this huge revolutionary vision but something reflecting today’s reality. Technology is ready to go –technology is ready for you to ...
Quantum Computing and the evolving cybersecurity threat
In the future quantum computers may be able to break strong encryption keys, this means businesses must now start to reevaluate their cybersecurity policies to mitigate this threat ...
Introducing the new Application Owner Alerts Workflow Tool!
One of the biggest challenges we face while helping our customers mitigate third-party risks, is that not all incidents are clear cut, as in not everything is “good vs. evil”. Some vendors ...
Tech Rules. Let’s Celebrate – TechStrong Con
Celebrating the critical role technology plays in helping us all get through this pandemic and beyond On March 17, I was supposed to be marching up Fifth Avenue in the annual New ...
Cyberstress: How Technology Is Changing Our Brains
The internet has become an extension of our brains. Perhaps not surprisingly, this presents at least a couple of different problems. One of those is digital amnesia: the idea that we rely ...

