Cybertech Midwest 2019 Debrief

Cybertech Midwest 2019 Debrief

We just finished a few days with our friends at the Cybertech Midwest conference in Indianapolis. I try to visit as many information security conferences as I can each year—it’s one way my team keeps up with the latest research, learns about new attack scenarios, new...
Understanding “Data Breach Safe Harbor” law

Understanding “Data Breach Safe Harbor” law

Last year, Ohio’s General Assembly passed SB220, referred to as the Ohio Data Protection Act. This legislation takes an interesting approach to cybersecurity regulation. Instead of mandating that a specific set of security controls be implemented, this data breach...
Innovative security tools at 2019 RSA Conference

Innovative security tools at 2019 RSA Conference

This year’s RSA Conference (RSAC) was bigger than ever – and I don’t mean that in the rote sense of “more exciting! Action packed! Full of more interesting things to see and learn!” I mean it literally – the physical space used by the conference that promises to...
Create your data breach response plan

Create your data breach response plan

Every so often, we get a panicked call from a client that is experiencing an information security breach. The client may have a rampant outbreak of ransomware, a defaced website, or worse … a complaint about lost or stolen data. The client needs to understand...
Cloud helps schools secure data infrastructure

Cloud helps schools secure data infrastructure

Today’s educational industry, both in the public and private sector, face a number of unique challenges when it comes to provisioning and securing data infrastructure. Educational institutions are continuously confronted with the same explosion of data and mounting...