Oct282020 How to Use Your Planning Cycle to Reinforce Your Cybersecurity Bryan Graf | 3 Minute Read Every organization has a planning and budgeting cycle. Planning is what enables organizations to prepare for the future, address and manage opportunities and threats,...
Oct232020 PCI Compliance in the Real World Bryan Graf | 2 Minute Read What would you do with $27.5 billion dollars? If you had 27.5 billion dollars, you could buy 916,667 cars at $30,000/each or 137,500 houses at $200,000/each. What’s special about this number? In...
Sep152020 Dissecting a Data Breach Notification and How to Avoid Having to Write This Message Jeremy Rasmussen | 7 Minute Read Public companies are required by law to report data breaches. These carefully written data breach notifications are often vague. For example,...
Sep022020 Is Your Cybersecurity a Plus or Minus for M&A Valuations? Greg Chevalier | 2 Minute Read Would I be correct in assuming that if you are considering a Merger or Acquisition (M&A) you want the “right” valuation that works for both parties? For...
Aug252020 How Three Basic Defenses Help You Avoid Web Server Breaches Bryan Graf | 5 Minute Read Perhaps you heard that chipmaker Intel corporation was recently the victim of intellectual property exfiltration web server breach? An anonymous source leaked a folder...
Aug182020 Stay on the Cutting Edge of Cybersecurity Awareness Training Shelby McDonald | 4 Minute Read You have probably heard the phrase “situational awareness”, the idea of being aware of what’s going on around you when it comes to your physical security. It is...
Recent Comments