Change and challenge were the watchwords of 2020, but one area that has not received the attention it merits, according to Joel Schwarz, director for MBL Technologies and a cybersecurity, privacy and data protection expert, is the growth of third-party risk.
Continue Reading Third-Party Risk Requires a New Role: C3POO
security
Redacting Confidential Information the Right Way
Dean Sappey, president and co-founder of DocsCorp shares the top 10 security features your redacted PDF should include.
Continue Reading Redacting Confidential Information the Right Way
Inside Facebook’s Security Culture
Michele Schochet, Director of Corporate Information Security with Facebook, discusses the corporate culture that drives one of the biggest tech companies in the world forward, including the increasingly important role that women play in computer engineering.
Continue Reading Inside Facebook’s Security Culture
Compliance Alone Does Not Guarantee Security
Continue Reading Compliance Alone Does Not Guarantee Security
Now That Your Data’s in the Cloud, How Do You Get It Out?
Data migration has reached a tipping point. The vast majority of technology decision-makers (84 percent) say that their organization invested in cloud services in 2016, according to Insight’s 2017 Intelligent Technology Index report. It noted that “while only 15 percent have fully migrated their corporate application workloads to public clouds, 47 percent are more than halfway implemented in the cloud, with large and medium companies leading the way.”
Continue Reading Now That Your Data’s in the Cloud, How Do You Get It Out?
Are You Accounting for One of Your Largest Cybersecurity Risks?
Article by: Charlie Platt / iDiscovery Solutions
I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams to help assess and control this cyberrisk. (At least I hope you are.) And one of the first things most security professionals recommend is taking an inventory of your IT assets. In fact, it’s embodied in the first Function of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework:
“The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs. Examples of outcome Categories within this Function include: Asset Management; Business Environment; Governance; Risk Assessment; and Risk Management Strategy.”Continue Reading Are You Accounting for One of Your Largest Cybersecurity Risks?
For Internal Investigations, Technology is Playing Catch-up with Technology: Companies focus on hackers and data, and sometimes overlook inside threats
Interview with Scott Lefton/AccessData
Scott Lefton is a senior sales engineer at AccessData. Though he is not directly involved in conducting or supervising investigations, he spends a lot of time talking to the people who do, including chief security officers, people in HR and, of course, in-house lawyers. He listens to their “woes,” he said, and suggests software designed to help them. His remarks have been edited for length and style. Continue Reading For Internal Investigations, Technology is Playing Catch-up with Technology: Companies focus on hackers and data, and sometimes overlook inside threats