A young security professional approached me the other day, looking troubled. “I’m having difficulty,” he said, “explaining to our clients the unique challenges of implementing cybersecurity plans and practices, especially in organizations that don’t currently have a culture of security – and then, once we introduce these security controls, how to Read More »
Source: Gary Braglia Blog
As March quickly rolled into action, I like many of my Northeast neighbors was hoping Staten Island Chuck was right – i.e. that we’d see an early Spring. Then reality set in. Which brings us to Stella.  Meteorologists are now calling for over a foot of snow to hit the Northeast region starting Monday night and lasting until Read More »
Source: Gary Braglia Blog
The advent of Europay | Mastercard | Visa (EMV) cards in North America has caused a whole bunch of confusion regarding the security of credit and debit card transactions. The ability to further secure a transaction with encryption, PINs and other controls has reduced risk for some transactions, but Read More »
Source: Reg Harnish Blog
The NFL’s biggest game – and one of the largest sporting events on the planet – is just days away, offering millions the chance to be entertained for a few hours. Fans will be glued to their television sets to experience the drama, the competition and the showmanship. Will they Read More »
Source: Reg Harnish Blog
Higher education has been a constant target for cyber criminals in the past few years. “According to some estimates, higher education accounts for 17 percent of all data breaches where personal information has been stolen.”(Carlos Soto, Tenable) Most recently, in 2016 higher education had become the second most targeted sector in Read More »
Source: Derek Loonan Blog