So, You’ve got Cyber Insurance and You’re all Set, Right?  

Cyber Insurance

How about we play a little cyber insurance trivia to find out?  Trust me; it’s more interesting than you might think. In an interview between Carole Theriault and Martin Overton, Theriault plays, “Covered by cyber Insurance, True or False” with Overton, who once worked for a large cyber insurance company. Overton describes himself as a

“Next Gen” Devices Aren’t Going to Solve Your Current Security Problems

next gen security, cybersecurity

Are you sick of the marketing hype suggesting some “Next Gen” security device can solve all your security problems? Yes? Good. If not, maybe you should be. Let’s pick on the Redmond giant for a moment to illustrate an example. Microsoft announced last month that after a legal victory, it had taken down 99 websites

Enhanced Ransomware Protection

Although the industry acknowledges a decline in the number of ransomware attacks in 2018, this news isn’t anything to get excited about. The trend has moved from targeting individuals via mass email campaigns to companies by way of manual attacks. Perhaps the reason for this is security awareness programs have been effective, and end users

Crime Does Pay

Well, at least cybercrime does. In fact, it turns out that it pays well. Bromium published a report in 2018 in which it asserted: “High-earning cyber criminals can make $166,000+ per month; Middle-earners can make $75,000+ per month; Low-earners can make $3,500+ per month.” That is serious money for the high and middle earners. For

Navigating an Unchartered Territory of Cybersecurity.

It was by pure chance that I attended a security symposium at Harvard’s School of Engineering and Applied Sciences (SEAS) several years ago. I don’t know exactly what attracted me to this particular meeting of crypto minds, but it was a very fateful day in my knowledge and understanding of Cybersecurity. Among many of the

Apathy: CyberSecurity’s biggest HURDLE

WE ARE COMFORTABLY NUMB, AND THE DATA AGGREGATORS KNOW IT…. Who knew Pink Floyd’s classic rock hit could be the theme song to the current state of data breaches.  Given the lack of any lasting public outrage for data breaches and leaks of personal data, I find myself wondering if the masses really care?  Meaning,

Along the Fault Line: CA takes on Data Privacy Rights & Silicon Valley Freaks

What’s to worry about California taking on Data Privacy Rights legislation that aims to protect the individual’s data and punish businesses that make their cash by peddling it? Well, it seems that if you Google “California GDPR”, ironically you might find results indicating that Google is none-too-happy, for one. Yes, that’s right, California has passed,

Dangerous SAML SSO vulnerability?

Several sources have recently reported the discovery of a ‘flaw’ in certain SAML implementations that could allow a ‘bad actor’ to alter the identity carried in a Single Sign-On SAML assertion and legitimately log in as a different user as reported by TechTarget. Wow – that’s bad!  That was my initial reaction, and I envisioned

The Importance of Analytics to Cybersecurity

In part 5 of 6 Vlogs, CTI’s Director of Cybersecurity, Ben Thurston makes the connection between cybersecurity monitoring and analytics. Ben explains the importance of analytics in gathering data and information from multiple security sources to provide insight into what is going on from a security/risk posture. Security analytics, like the CTI CustomerUniverse, collects information

A Multi-layered Approach to Securing Data Assets

In this 3rd of 6 Vblogs, CTI’s Ben Thurston explains to Mark Janowicz that there is no one cybersecurity solution that will solve all problems when it comes to data security.  The best approach, Ben explains is a multi-layered one. The data that is owned by your marketing team contains a lot of important and


© Corporate Technologies, Inc.   |  Privacy & Legal