PrivacyCon is going virtual this year. As the just-released agenda for the fifth annual Gathering of the Gurus demonstrates, you’ll want to mark July 21, 2020, on your calendar and watch the webcast for thought-provoking research into topics related to consumer privacy and data security. Read the entire article here.
FTC releases agenda for Safeguards Rule virtual workshop
Financial institutions collect personal information from customers every day, from names and addresses to bank account and Social Security numbers. The Gramm-Leach-Bliley Act’s Safeguards Rule requires those institutions to develop, implement, and maintain a comprehensive information security program. As part of its regulatory review process, the FTC has proposed changes to the Rule. Join us […]
Statement by DNI Ratcliffe on Recent Press Reporting
WASHINGTON, D.C. — Director of National Intelligence (DNI) John Ratcliffe today released the following statement: “I have confirmed that neither the President nor the Vice President were ever briefed on any intelligence alleged by the New York Times in its reporting yesterday.” FOR IMMEDIATE RELEASE ODNI News Release No. 25-20 June […]
DNI Ratcliffe Statement on Impact of Unauthorized Disclosures on Force Protection
WASHINGTON D.C. – Director of National Intelligence John Ratcliffe today issued the following statement: “U.S. and coalition force protection is a critical priority for both the President and the Intelligence Community. The selective leaking of any classified information disrupts the vital interagency work to collect, assess, and mitigate threats and places our forces at risk.” […]
Six steps toward more secure cloud computing
For businesses, cloud services are kind of like clouds. At their best, they can be soothing and expansive. But for companies that fail to appreciate the security implications, their ethereal presence may hide dangerous storms within. As cloud computing has become business as usual for many businesses, frequent news reports about data breaches and other […]
Unemployment benefits fraud puts workers at risk of more ID theft
A large-scale scam involving phony unemployment benefits claims has been making headlines. Criminals, possibly based overseas, are filing claims for benefits, using the names and personal information of people who have not lost their jobs. The investigation is ongoing, but this much is known: the fraud is affecting tens of thousands of people, slowing the […]
Message of the Qualpay case: Heed possible signs of fraud
Ostriches get a bad rap. The popular perception is that the species Struthio camelus bury their heads in the sand. But, in fact, they flee from perceived danger at speeds that top 60 miles per hour. An FTC proposed settlement with a payment processor that ignored signs that certain clients were engaged in fraud […]
Are Executives Ready to Respond to Today’s Flight to Remote Work?
With the flight to remote work happening so suddenly, senior decision makers at small and medium sized businesses simply haven’t come to reality with their cybersecurity capabilities, and in turn, vulnerabilities. The big question becomes: are executives ready to address the onslaught of cybersecurity needs that come with indefinite remote work? Read the entire article […]
Houston Private Investigation Company Spotlights Hidden Business Threats
Houston Private Investigation Services Running a business involves a great many challenges, and this Houston private investigation company helps when those challenges involve threats to the business. They can involve internal, external threats, or both. Often you’re in the dark, unaware of threats, and the job of the private investigator is to spotlight them for […]
Securing the Mainframe: How Companies can Empower Security Analysts to Protect the Backbone of Their Enterprise
To apply true holistic security best practices and reduce significant risks to the mainframe, security teams must embrace an integrated mainframe security strategy. When it comes to securing the platform, the simplest solution of applying intelligent security software like EDR and testing its effectiveness—the security best practice that exists on all other systems—is often […]