Social Media and Security

Social media applications on a smartphone

Last week, I posted on thoughts about where organizational cyber-security responsibilities should be assigned. This week, I…

Continue reading »

Firestorm #TOPJob – Technical Solutions Architect – Security

Technical Solutions Architect – Security Springfield, IL Job Posting #2974 Position: Technical Solutions Architect – Security Location: Onsite –…

Continue reading »

Don’t Take the Bait – The IRS Dirty Dozen Sees New Phishing Scams in 2018

technology and computer code

The April tax deadline is nearly here (Tuesday, April 17, 2018), but that doesn’t mean scammers and…

Continue reading »

Now Open: Firestorm Analytical Solutions IT Resiliency Planning Assessment Study

The Firestorm Analytical Solutions IT Resiliency Planning Assessment Study is open for participation. Participants will receive a…

Continue reading »

Security – Whose Job?

In the wake of revelations of the sale of enormous amounts of personal information by Facebook to…

Continue reading »

What Black Mirror and Cyber Risk Have in Common

view of side of skyscraper

Black Mirror, a British science-fiction Netflix series, has gained popularity among viewers since its release in late…

Continue reading »

Phishing this Holiday Season

When a questionable email hits your inbox, do you open the email or delete the message? The…

Continue reading »

Why Boards Should Focus on Building Up Cyber Defenses & Cyberattack Responses

Reposted with permission of: Diligent. Read original article here. The rising star of the corporate world is…

Continue reading »

Equifax – Proof That Sometimes A Business Can’t Buy Enough Insurance

cyber attack

Bloomberg recently reported that Equifax Inc.’s insurance against cyber breaches is likely insufficient to cover the credit-reporting…

Continue reading »