Similar Posts
Protecting Website Security Question Answers
ByadminIn light of the recent Callaway golf equipment vendor’s websites (multiple) breaches, which compromised security questions and answers, here is a simple tip to reduce your risk going forward from these breaches.
DoD’s New Instruction on Labelling Controlled Technical Information
ByadminMost defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
Will You be the Last to Know?
ByadminExternal attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…
Impact of Cybersecurity on Mergers and Acquisitions
ByadminWe often get asked about how a seller’s cybersecurity practices impact business valuation and related to that, how a lack of cybersecurity due diligence on the part of the buyer impacts overall risk. Here are two very public examples of that; one favorable to the buyer, the other favorable to the seller. If you are…
Technical Debt
ByadminAre you managing your technical debt? Do you even understand what technical debt is? Does your management and Board (if there is one) understand that unaddressed technical debt is like a bottle of nitroglycerin just waiting to be jarred in the wrong way. And we just saw a massive example (as in their technical debt…
Dark Patterns
ByadminEver try to cancel a subscription online? Or even figure out when the subscription is due to be renewed? That difficulty is intentional and is now against the law in many states and countries. If you operate an online presence, it is important for you to understand what you are allowed to do and what…