May 16, 2020 | Applications, Best Practices, Business, Collaboration Tools, Encryption, Human Element, Internet, Internet Infrastructure, M&A, Marketshare, Messaging, Radio Show, Radio_Show, Security, Security, Security Alerts, Stress Test, Technology, Technology, Zoom
Encryption Wars: Collaboration Services Acquire to Compete for Marketshare The pandemic laid bare the vulnerabilities are some popular business collaboration platforms. Usage of these platforms surged during the coronavirus pandemic as more businesses began to rely...
Mar 21, 2020 | Agencies, Announcements, Best Practices, Biological Viruses, Biological Warfare, Business, Cable Companies, Cisco, Cloud, Cloud Vendors, Compliance, Computers, Coronavirus, Covid-19, Covid-19, Critical data, Cyber Liability, Data Storage, Domain Name Service, duck duck go, Employees, Encryption, Executives, FDA, Filtering, Firewalls, Firewalls, Government, Information Technology, Internet, IoT, Laptops, Malware, Networking, Networking, Operating Systems, Pandemic, Patches, Patching, Quarantine, Quarantine, Quarantine, Radio Show, Radio_Show, Regulatory Compliance, Remote Work, Remote-Work, Routers, Routers, Security, Security, Security Alerts, segmentation, Social Distancing, Software As A Service, Switches, Technology, Updates, Updates, VPN, VPN, WebEx, WHO
Being Successful While Remote Working If you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...
Jan 11, 2020 | Access Controls, Amazon, Apple, Asset Management, Attack Vectors, audit logs, Backup, Big Tech, Business, Computers, Cyber breaches, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Employee Training, Employment, Encryption, Fines and Penalties, Google, Hacking, Incident Response, industrial espionage, Insider Threat, Internet, Jobs, Legal, Liability, Malware, Malware, Microsoft, Monitoring, Networking, predictive algorithms, Radio Show, Radio_Show, Ransomware, Security, Software As A Service, Surveillance, Technology, Zero-Day
How Mature is Your Insider Threat Intelligence? Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Jan 11, 2020 | Amazon, Applications, Asset Management, Attack Vectors, Big Tech, Business, Cloud, Compliance, Cyber Liability, Cybersecurity, Data Assets, Encryption, Fines and Penalties, Google, Governance, Incident Response, Microsoft, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Third - Party, Updates
Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about “the cloud,” and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years....
Jan 11, 2020 | Algorithms, Applications, applications, Applications, Artificial Intelligence, Automation, Automotive, Business, Cars, Coding, Computers, Consumer, CPU, Cyber Liability, Encryption, Hacking, Incident Response, Law Enforcement, Liability, LIDAR, Location Data, Machine Learning, Navigation, Patching, Police, predictive algorithms, Radio Show, Radio_Show, safety, Security, Security Alerts, Technology, Updates
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors In an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...
Jan 11, 2020 | Amazon, anonymity, Apple, Applications, Asset Management, Audit Logs, audit logs, Big Tech, Big Tech, Business, CCPA, Chrome Browser, Compliance, Computers, Cyber Liability, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Encryption, Financial, Fines and Penalties, Google, Government, Hacking, Internet, Legislation, Malware, Microsoft, Monitoring, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, spying, Technology, Updates, Windows (Microsoft)
Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored? California’s...