4 Predictions from the Cybersecurity Crystal Ball
Given the high frequency of hacks in 2014, we can expect worse cyber-attacks in 2015. Here are my own cybersecurity predictions for 2015. The post 4 Predictions from the Cybersecurity Crystal Ball...
View ArticleCollaboristaBlog Roundup January 16
Welcome to your guide on the latest collaboration and data security news. This week features cybersecurity, mobile security, and data protection tips. The post CollaboristaBlog Roundup January 16...
View Article2015: The Year of Data Privacy
2015 may be the year of data privacy. While the preceding decade has been a slow crescendo of data privacy issues, we are entering a possible overture. The post 2015: The Year of Data Privacy appeared...
View ArticlePracticing Law Securely — No More Attachments
How should lawyers be securely storing, transmitting, and sharing information? Here are some law information security best practices from Bob Blacksberg. The post Practicing Law Securely — No More...
View ArticleWhy Hackers Are Getting into the Espionage-as-a-Service Business
Espionage is typically connected with organizations backed by the governments of nation states. However, more private hacker groups are entering the scene. The post Why Hackers Are Getting into the...
View ArticleInformation Security ‘Unquestionables’
There are several questions that today’s enterprises should consider when evaluating a cloud service provider’s customer managed encryption keys solution. The post Information Security...
View ArticleCorporate Boards Placed on Alert to Escalating Document Security Risks
The NACD held a meeting to discuss information security issues facing business leaders. Secure collaboration should be a priority for organizations. The post Corporate Boards Placed on Alert to...
View ArticleEvery CISO’s Mission: Keeping Corporate Data Secure
The mission of the chief information security officer and the corporate security team is to protect the company’s critical assets from risk of a breach. The post Every CISO’s Mission: Keeping Corporate...
View ArticlePracticing Law Securely — Current Developments
Cybersecurity initiatives by the SEC and FTC deserve attention. Organizations must put security measures in place to avoid non-compliance and data exposure. The post Practicing Law Securely — Current...
View ArticleCyber Insurance Is Good to Have but It Won’t Protect a Company (or a CISO)
Cyber insurance is good to have, but it won't protect a company against a breach. Insurance should be viewed as one aspect of a more comprehensive strategy. The post Cyber Insurance Is Good to Have but...
View ArticleLaw Firms Are Not Immune to Hackers
As we saw from recent news, hacking law firms is not new. This begs the question: How should law firms detect a data breach or prevent one? The post Law Firms Are Not Immune to Hackers appeared first...
View ArticleCyber Checklist: Security Questions to Ask Your Law Firm
What questions should you ask your law firm regarding its security posture? Let's start with industry standard, ISO 27001 certification security principles. The post Cyber Checklist: Security Questions...
View ArticleStreamlining Investor Reporting and Developing Client Relationships
The more fund managers can streamline their current investor reporting processes, the better their investor relationships and internal processes will be. The post Streamlining Investor Reporting and...
View ArticleSafeguarding Client Data and Avoiding the Fines
Given the regulatory environment and increase in cyber-attacks, more institutions are taking proactive steps to boost their cybersecurity programs. The post Safeguarding Client Data and Avoiding the...
View ArticleSocial Engineering and Social Media: A Top Security Concern for Hedge Funds
Given the growing threat of data breaches, hedge funds are vigilantly seeking solutions for a robust security program. At a recent event hosted by Intralinks, Thomas Deinet, CEO of the Hedge Fund...
View ArticleCyber Insurance Is Good to Have but It Won’t Protect a Company (or a CISO)
Cyber insurance is good to have, but it won't protect a company against a breach. Insurance should be viewed as one aspect of a more comprehensive strategy. The post Cyber Insurance Is Good to Have but...
View ArticleCyber Risk and Data Security Top of Mind at Insurance and Risk Linked...
The cyber insurance market is growing significantly; it's more than doubled in the past two years growing from $1 billion in 2013 to $2.5 billion 2015. The post Cyber Risk and Data Security Top of Mind...
View ArticleLaw Firms Are Not Immune to Hackers
As we saw from recent news, hacking law firms is not new. This begs the question: How should law firms detect a data breach or prevent one? The post Law Firms Are Not Immune to Hackers appeared first...
View ArticleHow Technology Enables More Transparency Between Fund Managers and Investors
Investors have become increasingly insistent around the issue of transparency when selecting a fund in which to invest. Here's how technology can help. The post How Technology Enables More Transparency...
View ArticleCyber Checklist: Security Questions to Ask Your Law Firm
What questions should you ask your law firm regarding its security posture? Let's start with industry standard, ISO 27001 certification security principles. The post Cyber Checklist: Security Questions...
View Article