Home Search
cybersecurity - search results
If you're not happy with the results, please do another search
Matt Kelly on Cybersecurity and Suppliers [Podcast]
Post By: Adam Turteltaub
Matt Kelly, Editor & CEO of Radical Compliance makes a strong case in this podcast for a need to reassess cyber...
Startup AI Raises New Controversy in Cybersecurity
Post By: David Lukić
While AI has humble roots in the Turing machine which provided the blueprint for modern-day computers, it has certainly evolved since...
7 Most Common Cybersecurity Mistakes To Avoid
Post By: Freddie Tubbs, Business Analyst, Academized
Most website owners pay close attention to various factors affecting their website`s popularity and conversions but leave little...
Giving Cybersecurity the “Cassandra Treatment”
By Jonathan Rusch
Principal, DTG Risk & Compliance LLC
In Greek mythology, the god Apollo gave Cassandra, the daughter of King Priam of Troy, the gift...
Reaching Across Siloes: Compliance and Cybersecurity in Partnership
Adam Shnider
Vice President, Delivery, Coalfire
The risks posed by the continually escalating number, variety, and sophistication of cyberthreats have in many ways worked to redefine...
Ethikos Editor’s Weekly Picks: The Ethical Obligation of Cybersecurity
Examining ethics and compliance issues in business since 1987
The ethical obligation of cybersecurity
By Kevin Szczepanski for Buffalo Business First
As lawyers we hold some of our...
The Components of Strong Cybersecurity Plans Part Five: Penetration Testing
By Mark Lanterman, Chief Technology Officer, Computer Forensic Services
Carolyn Engstrom, Director of Corporate Compliance
In the fifth and final installment of this cybersecurity series, I will...
The Components of Strong Cybersecurity Plans Part Four: Technical Vulnerability Scanning
By Mark Lanterman, Chief Technology Officer, Computer Forensic Services
Carolyn Engstrom, Director of Corporate Compliance
As discussed in my previous three articles, strong security programs are comprised...
The Components of Strong Cybersecurity Plans Part Three: Security Auditing
By Mark Lanterman, Chief Technology Officer, Computer Forensic Services
Carolyn Engstrom, Director of Corporate Compliance
In the last two articles of this series, I discussed the role...
The Components of Strong Cybersecurity Plans Part Two: Security Assessment
By Mark Lanterman, Chief Technology Officer, Computer Forensic Services
Carolyn Engstrom, Director of Corporate Compliance
In the first article of this series, I described the role of...