Doorbell privacy: Where the ring tolls
Amazon’s Ring video doorbell allows you to see who is at (or near) your doorstep. Under a semi-secret program called “Neighbors” it also allows the police to see the same…
DetailsAmazon’s Ring video doorbell allows you to see who is at (or near) your doorstep. Under a semi-secret program called “Neighbors” it also allows the police to see the same…
DetailsMany companies grapple with integrating cybersecurity awareness into the organizational culture. After many years as a CISO and cybersecurity consultant, I believe the answer to this perennial problem is to encourage the organization…
DetailsCompanies need to embed cybersecurity into the DNA of their organizations to combat potentially disastrous cyber threats by state actors and individuals. This is the message that Richard Clarke, former National…
DetailsA Vulnerability Management Program is made up of a complex matrix of policies, processes and tools that enable security professionals to turn a detective control into an ongoing risk-management operation.…
DetailsPasswords as a means of authentication have been around for a long time. Their existence is based on the fundamental premise that it is only the consumer or user who…
DetailsHere is a fun exercise if you are bored. Go into any grocery or superstore. If you prefer online shopping, log onto your favorite retailer and find/pick any one…
DetailsDo CEOs and Boards have any idea what the company’s cybersecurity status is? Cybersecurity and privacy compliance should be a top priority of the Board of Directors and senior management…
DetailsChief Information Security Officers (CISOs) Laud Baffle for Innovation and Twist & Shout for Ease of Use San Francisco, CA – Security Current™ announced that CISOs selected advanced data protection…
DetailsIt’s no secret that all it takes is the weakest human link to compromise a company’s cybersecurity. To mitigate this risk, companies need to understand their employees’ habits and behaviors;…
DetailsI’m sometimes asked if I ever experienced difficulties being a woman in the male-dominated cybersecurity field. My answer: “I could write a book on it!” I remember very clearly an…
Details