Cyber News
Microsoft Proposes Norms for Fighting Cyberbreaches <br>China's Proposed Data Localization Cybersecurity Law Catches Eye of U.S. Tech Companies<br>Brown University Offers New Graduate Program In Cybersecurity Leadership
The Internet of Things
The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things ("IoT," for short) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?
International Cybersecurity Compliance Concerns
Social media has made even the most mundane and possibly personal pieces of data available to many with a press of a finger. Such an open relinquishment of private information is almost assumed, and has become part of the American culture. Those who think about how easy it is to access data understand how their own data has become part of the searchable cyberspace.
Under the Radar Industries Prime for Cyber Hackers
It is no surprise to anyone that certain industries are more of a target for cyber criminals than others, although today all businesses are likely on the radar. The financial institutions and large retailers usually get most of the attention. However, four industries are high-value targets, and lag behind the preparation curve: hospitality, healthcare, higher education and legal.
What Do Law Firms Need to Know About Cloud Cybersecurity?
Here's the premise: The cloud is a fundamental technology solution option that truly solves all kinds of law firm business and legal IT challenges including innovation, security, governance, global availability, etc. Modern law firms want the efficiency, the security and the global access of the cloud, while satisfying the security demands of their clients.
Making Informed Choices about the Deep, Dark Web
A majority of Internet traffic and online data lives beneath the surface of the Web as we know it. In the darkest, hidden recesses of the Internet, individuals engage in illicit activities and cybercrimes, but also in substantial activism, journalism and sensitive communications.