Category Archives: Information Privacy and Security

Like Humpty Dumpty’s fall from the wall, a major data breach can crack a government
Posted by

Like Humpty Dumpty’s fall from the wall, a major data breach can crack a government

When governments suffer data leaks, the traditional fallout of breaches are combined with political scandal – the impact is multiplied and scrutiny magnified. Questions are asked around why information was withheld or, if announced soon after discovery, why it took so long to uncover. Just as a business suffers reputation damage after a breach, the […]

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies
Posted by

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies

Recently, I did an interview with Bloomberg Newsweek on the WannaCry ransomware attack that affected over 200,000 computers around the world.  The attack shutdown parts of the U.K. National Health Service leaving thousands of people without access to healthcare services, and resulted in Renault’s assembly lines being shut down in France among other things.  Newsweek […]

Mitigating Cyberattacks: The Prevention and Handling
Posted by

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses but as companies adopt cloud services in greater numbers and refine internal processes for development and operations, security considerations must be front and center. As companies rapidly adopt Cloud with a DevOps approach to rapid […]

Promoting Data Security in the Workplace
Posted by

Promoting Data Security in the Workplace

No matter the workplace, data security is often a top concern for management professionals. Security breaches can end up threatening the livelihood of employees and entire companies alike, depending on how severe they are. There are solutions available to many common professional data security problems. However, understanding the surrounding statistics is often the first step. […]

5 Recommendations For Effective Governance, Risk And Compliance Management
Posted by

5 Recommendations For Effective Governance, Risk And Compliance Management

Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a corporate ‘no-cloud’ policy will be as rare by 2020 as a ‘no-Internet’ policy is today. However, a ‘’cloud-ready’ security and compliance program is the need […]

Should Apple fight a court order to unencrypt iPhones? #unlockiPhone
Posted by

Should Apple fight a court order to unencrypt iPhones? #unlockiPhone

There is a lot more than what meets the eye in Tim Cook’s spirited fight against the FBI and US DOJ’s demands to create a back-door for iPhones. Don’t hold your breath for this riveting saga to come to any real conclusion for at least a few more weeks. While the FBI has made a specific […]