GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Richard Henderson
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

This post originally appeared in CSO Magazine.  Everyone in the security world is talking about the EU’s General Data Protection Regulation (GDPR), and rightly so. GDPR is almost in full force, supplanting the older (and some will argue, out of date) EU Data Protection Directive (DPD). I don’t think regular readers of security news need to be reminded of the severity of penalties that the EU can levy against...

READ MORE
3 Steps to Asset Management and Software Auditing
Richard Henderson
3 Steps to Asset Management and Software Auditing

With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Since they are critical for business getting done, endpoint disruption can have a significant impact on your day to day operations. Protecting them is paramount. There are four key pillars to building an endpoint security program that does its job well and I detail each of...

READ MORE
3 Ways Healthcare Organizations Can Improve Data Security
Kevin Golas
3 Ways Healthcare Organizations Can Improve Data Security

The amount of endpoints on healthcare networks is growing exponentially, from BYOD and corporately-owned mobile devices to a host of IoT devices such as printers and smart appliances. All are brought in with the well-intended motive of improved productivity but when you combine device proliferation with healthcare organizations’ legacy systems and inadequate security budgets, it’s easy to understand why interoperability is such a pervasive problem in healthcare today. Better...

READ MORE