HR data

Keeping HR Data Secure in a Time of Data Breaches

Risk management has never been more important, especially at a time when data breaches continue to increase. There are numerous high-profile examples involving the theft of employee data. Identity fraud cases exceed ...
Security Boulevard
election

How the Tech Landscape Could Change Post-Election

With election season in full swing, we thought it might be fun to ask ourselves a hypothetical question: How might the technology landscape as we know it change if the current administration ...
Security Boulevard
Taking Third-Party Application Security to the Next Level: Reflectiz' Multiple Website Dashboard

Taking Third-Party Application Security to the Next Level: Version 2.8’s Multiple Website Dashboard

Version 2.8 Goes LIVE!  Almost any organization today uses dozens of websites and subdomains. Each provides essential functions and uses dozens of third-party apps and tags to produce its capabilities. Those assets ...
The Cybersecurity Effects of Fourth-Parties on Websites

The Cybersecurity Effects of Fourth-Parties on Websites

Fourth party apps on websites are commonly referred to as “the vendor’s vendor code”. Fourth-party apps may offer additional benefits, but at the same time they also carry a set of threats ...
Zero Trust: Identity at the Core

Zero Trust: Identity at the Core

In my last post we looked into why Zero Trust is not this huge revolutionary vision but something reflecting today’s reality. Technology is ready to go –technology is ready for you to ...
Why quantum computing is a risk to traditional cybersecurity

Quantum Computing and the evolving cybersecurity threat

In the future quantum computers may be able to break strong encryption keys, this means businesses must now start to reevaluate their cybersecurity policies to mitigate this threat ...
Introducing the new Application Owner Alerts Workflow Tool!

Introducing the new Application Owner Alerts Workflow Tool!

One of the biggest challenges we face while helping our customers mitigate third-party risks, is that not all incidents are clear cut, as in not everything is “good vs. evil”. Some vendors ...
TechStrong Con

Tech Rules. Let’s Celebrate – TechStrong Con

Celebrating the critical role technology plays in helping us all get through this pandemic and beyond On March 17, I was supposed to be marching up Fifth Avenue in the annual New ...
Security Boulevard
remote work

Cyberstress: How Technology Is Changing Our Brains

The internet has become an extension of our brains. Perhaps not surprisingly, this presents at least a couple of different problems. One of those is digital amnesia: the idea that we rely ...
Security Boulevard