Moods and Motives of a Smooth Criminal – IOSS 19


After reading about an IT admin at large bank who went rogue, we put on our empathy hats to understand why. And in this episode, we came up with three reasons: Instead of being recognized as a revenue generator, IT is seen as a cost center Despite all the tests and certificates,  IT people aren’t as […]

Continue Reading →

Top 10 Chief Data Officers to Follow on Twitter


Over the past couple of years, Chief Data Officers have evolved into a C-suite staple. Why? Whether the CIOs are overwhelmed with IT demands, or organizations are recognizing the value in their data, CDOs have a key role to play in data governance initiatives. A CDO’s mission is “to bring order to the plethora of data sources within […]

Continue Reading →

Let’s Get More Serious About AR and Privacy


Augmented Reality (AR) is the technology of the moment. While some of us have already experienced the thrill of catching a Dragonite in Pokemon Go, AR is not just all fun and games. In fact, depending on how an AR gadget is used, it can have significant privacy implications.

Continue Reading →

American Health Insurance Plans Stay Secure With Varonis


For any organization in the health insurance industry, security is a top priority. American Health Insurance Plans (AHIP) understood the need to enforce security within its organizations in order to stay safe from insider threats. That’s when extensive search led to the implementation of Varonis Data Transport Engine, DatAdvantage, and DatAlert. AHIP was formed in […]

Continue Reading →

Excellent Adventures at Black Hat – IOSS 18

black hat

Hackers, Executives, Military Folks, IT People who work in Insurance, even Cab Drivers all had something to teach us about security and privacy at the latest Black Hat event in Vegas.

Continue Reading →

EU GDPR Spotlight: 72-Hour Breach Notification Rule


One of biggest and more controversial changes in the EU General Data Protection Regulation (GDPR) is the requirement for companies to report breaches of consumer personal data.  Fortunately, we recently had the chance to talk with an expert on GDPR compliance to find out some of the subtler details. “Likely to Affect” The first key […]

Continue Reading →

Top Minds in PCI Compliance


With countless data breaches hitting the front page, many are turning to the Payment Card Industry Data Security Standard (PCI DSS) which is an invaluable controls list to guide, influence, and promote security. However, there are merchants who argue that these controls provide too much security while security professionals think they provide too little. So […]

Continue Reading →

HHS to Investigate Smaller HIPAA Privacy Breaches


As  a reader of this blog, you know all about Health and Human Services’ (HHS) wall of shame. That’s where breaches involving protected health information (PHI) affecting 500 or more records are posted for the world to see. It’s actually a requirement of HIPAA – technically the HITECH Act. But now there’s been a slight […]

Continue Reading →

More Articles on Privacy by Design than Implementation – IOSS 17


Going from policy to implementation is no easy feat because some have said that Privacy by Design is an elusive concept. In this episode, we meditated on possible solutions such as incentivizing and making privacy as the default setting. We even talked about the extra expense of having a Privacy by Design mindset. What do you […]

Continue Reading →

Threatbusters – IOSS 16


If there’s something strange on your network, who should we call? The security team! Well, I like to think of them as Threatbusters. Why? They’re insatiable learners and they work extremely hard to keep security threats at bay. In this episode, we talk about awesome new technologies(like computer chips that self-destruct and ghost towns that […]

Continue Reading →

New SamSam Ransomware Exploiting Old JBoss Vulnerability


One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware was (and is still) having great success primarily against healthcare companies and hospitals. The attack vector, though, was not based on phishing or social engineering. […]

Continue Reading →